General

  • Target

    22012025_0016_21012025_RFQ SK EONIK - PR SKEON0454855.pdf.z

  • Size

    543KB

  • Sample

    250122-akxhkayngn

  • MD5

    faa8f40351d381a12b76d0a32c0589f5

  • SHA1

    1854ef77adb1275776a6e99d46985791a31a9c69

  • SHA256

    ad15ef320d324310542bd62f16c04ba2aa9d00b22ba3b004a05994c80eae50c9

  • SHA512

    2339771f87c6dcf2c1b866a3ad47268950b3f7daecd1b4be6ae6fe5da9604956c573141c43ac417d847d7722ffbf204e38b5d52e75794c1738fbcb715cdb067b

  • SSDEEP

    12288:47iZ7Z+xRIr8YKigTQROhMjvVGGVtKc0TcECO1L0UUD5Cu6h2I7eiYhioq:47WZaRIeOfK9UO1L0vD5IVKS

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      RFQ SK EONIK - PR SKEON0454855.exe

    • Size

      666KB

    • MD5

      c12e37708bd01acec5ba51ee84e8a7a7

    • SHA1

      9f69e52b9e5ace09e76d432de3ca050d3955eaa4

    • SHA256

      599e32f5b371ec260efde42608e91ae28cf2dc30e088ba9167d82a3762ae4120

    • SHA512

      605f1560df284067e8db4a5337531ca375da5ebf9535e6e9191517c1c5dcef4479b871b8dd7211aa82c9e63f9c01b0c90bcc8ab735e103e6f042a2a153a9a172

    • SSDEEP

      12288:GKOlbxrd0IO8DfiFrwjiLKLOseCHABW6t5Kww2CvkuLwZft1b:u/fSriiLKis8tVQW3b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks