Resubmissions

07-11-2024 12:50

241107-p3ah3ssfmk 10

07-11-2024 12:47

241107-p1fmbavmfj 8

General

  • Target

    =XUTF-8XQXyeni_sipari=C5=9F=2Er00X=

  • Size

    558KB

  • Sample

    241107-p3ah3ssfmk

  • MD5

    027b03cee16500f3c919be5bdbbb23be

  • SHA1

    3e463e6f6675bb13a231706136927ea861299205

  • SHA256

    7e1381c64bd9b22722685486aede77240202f163ff0264196da0940d1554bc93

  • SHA512

    a6e5ce4d677bd58c6d0adca3269077866388a216a5020c0371224af67153da0eff6b98ba4f0235d4f5d728c159332898cb2b49c656d333aa18b79b2e52042de9

  • SSDEEP

    12288:itvk9x/nnGkcyk8RHPj+/CqqCoq1WWQBV5bK9GeiWT4/D6zENA:ykfGkvL+/CqqCoq1RQocPWTeD5NA

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Targets

    • Target

      yeni sipariş.pif

    • Size

      603KB

    • MD5

      adf22eb2587ab26a966c2c9673580a73

    • SHA1

      a846d4a58ae7b294c1958cc538b5ed103e7445fb

    • SHA256

      a1777be6284799cc06a9d9072f4f3d2181287fb7770cbd7dbfb5bbd7d031dc30

    • SHA512

      bde338b7d5d338dba1e8aeb0bcd5e5e390025aec48e4fffe518b194a22fe6aee4cd1db0480e682e85d9d4ac20cc2ab1c4da9fb8fc03b57344145d94390a6ff34

    • SSDEEP

      12288:woaDPw1Qk89Tmyy8e9vLr78Ly3KzgGUsB/gRZYHdh:gLw9gTFyXjvgy3Kz/UKWqd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks