General

  • Target

    4b1c6ffcfbec78b82623868cfe8d5a08a3aafe9430dd4562cd6ba16399647758

  • Size

    531KB

  • Sample

    241008-qkekrasdnf

  • MD5

    ee3e4877fa578a2d3cfda6750b2c5d54

  • SHA1

    a0be3816801910f456a4b15f9b1aebaf80f9e2e9

  • SHA256

    4b1c6ffcfbec78b82623868cfe8d5a08a3aafe9430dd4562cd6ba16399647758

  • SHA512

    c420522aa30423f12a8f94b9ae12854b389abea23d0c2a818bd10e4b4b876f3fa5e65dec883cc6e2fc05f56f2746fced0520af48df30847cf16d0ba92c87fb54

  • SSDEEP

    12288:KK99+nc+7/0GL5GLiQ6e3V511XnBu28QzqTkNM8yF:+ncY8GL4L36e/19BufQ22yF

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pishgamsanaat.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Pishgam123456

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      U prilogu je predracun.exe

    • Size

      600KB

    • MD5

      7805af2fe70854ae49f57b6d3a95e59e

    • SHA1

      541d0eb275873c736eb7b80ab1b3619c8c2024dd

    • SHA256

      b498a3f4967ef692a331633708f10ac8bbe57579957102bfe751cd479a4cc92f

    • SHA512

      031ae4fa84f65a56494cd142163c1ec169b2d6ab347433cbf686e7c31058d2951748c3bc15c5458e02f5153922e062e5dc21334cc9a08421b394772139bc285e

    • SSDEEP

      12288:znC0w99+n4+7zVlsIML0qv3V5X1TnluGvy7Y1/xy1q5mE+:Rwyn4YRlsZ5v/XRlutcysEE

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks