General

  • Target

    New Purches Order.zip

  • Size

    528KB

  • Sample

    250217-mncnsayjhq

  • MD5

    3ee0e00084a436ad5f6eb25ab5aee41b

  • SHA1

    faf0b56d4ad51b6473575c7d727e642afe9f7efd

  • SHA256

    96c32325b07758af2a66e76fc8ef7c7d81752cd78476b731476e52ce51292bf4

  • SHA512

    1d7f9ecff9aa1ba1d41d116be909eba949d4db135e7a4a40e878621470156e05ad253e24ae0b3dada1ccc1a30e5db8c96ace04ab92e18ee7783eb09d6d7309e5

  • SSDEEP

    12288:9+SMBZjkbkRSyX3TZOnBcU+PoTvULRaGs3a6Q0CeMNHKVOtZ29gGEpczX:gFZjkb3iDs+taGIa6kfHKoOBd

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7891452286:AAE2oLBQvjY6qRrkalPPxinaMdSDDJEY_C8/sendMessage?chat_id=7225431807

Targets

    • Target

      New Purches Order.exe

    • Size

      613KB

    • MD5

      60158da472c90a2c923bf79be848b8d3

    • SHA1

      8b8de08cfab42c95c60613a91ce71e90b8c51913

    • SHA256

      faa8850d8a28a308c917200981a80bcc481cb089f804f6867a4608a28bf0b2b5

    • SHA512

      dd6a9d12c75eaea593f63e2bccd6ca8add0061d31d22abee4fd5f01ff35af2e94b01f3eb6846023955b812c425fa7ef78e46deca37ed8d1e494589dfe3e5557d

    • SSDEEP

      12288:yxgmiFTt9XakdciLNU/Z0Xa6QqIWMNHKpOtZyLWLP7VSR:G4HtaMLahKa6CXHKcGEP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks