General

  • Target

    Description.rar

  • Size

    1.2MB

  • Sample

    250117-nzkn7swrfj

  • MD5

    d57433d03f01f6205260f9e68a5cf61e

  • SHA1

    744075a7f4cefd6c5b6165185075f715e1cb93ce

  • SHA256

    99708cebaf8533fccab62718d43c6c1cdfdcb48640c423306a894dfbdc519b85

  • SHA512

    4a7fbb0a4766c5d5b6c4e91c096e25790926644e4d2cbdc1de2372d3abd40a04513eef732efd912f329c9e05bf3c134bbca4ff6eaa81c42363c802f16877e3c7

  • SSDEEP

    24576:TMNGSZVkogM7vl02PPyL3S3mfUJyZGWG3BdCkh5wbZu4Q:TUGGSs7dDPyLiWfuywWoBYQ

Malware Config

Extracted

Family

darkvision

C2

acuweld.ddns.net

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7666772215:AAG3oWDDhgYedd4yOneZp0AStrhY_tgTlTc/sendMessage?chat_id=5830304904

Targets

    • Target

      Document desription.exe

    • Size

      1.3MB

    • MD5

      42e5f44b46f5a582a85829236ba2c2c8

    • SHA1

      d733b18d85baead3612710bbd7965f17f96b22c4

    • SHA256

      6f5273caf722986c373fd330354161fa8140201f41b0edec092700ab2ed463e3

    • SHA512

      70ad0cd995d1fc3602190d27c0f53a17e4c342d270998205f69c1e9b3cebf019d45e312542a852ac0921bff41a9b5584d4d8d36543712fe0c7507644134daad7

    • SSDEEP

      24576:aQejQy4n+DF3BwDEXWxCVsdRG9zGE5jDkyY7abKv35NXGbEJOa7lgE:dAQy4duWxKsd49z9jS7rGUZ

    • DarkVision Rat

      DarkVision Rat is a trojan written in C++.

    • Darkvision family

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks