General

  • Target

    Purchase Order 77809 for acknowledgment.zip

  • Size

    653KB

  • Sample

    250219-gbs74sylen

  • MD5

    3b166faf5a15f1279eb2671a0432ad2b

  • SHA1

    8610083042201b17b9bb76a9746e4308839b7d50

  • SHA256

    8db3ddff6b96d9b8f78b729a456eb1273805b2b03561bff8b7652b5ac073e2e8

  • SHA512

    17abccb238f10164a68bf8a074146d417284c3b0bb939e337f4c923d91bedd59ea9a248ee65ace8bffe82dadbf8e2fcdf7059360f77b5c6021d53f7c98a3a3d5

  • SSDEEP

    12288:FGqB+Egzud0UJwCQiffPc+f+gNanLWPGUtLamQaGh6ax8HEuDk2vFp:FGqNrd0UKCQiffLf+gNanLMGu3ax8Hxz

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7570158401:AAGzmritmTT3Z0Z77i4ThJMCq3NzbjqeNpo/sendMessage?chat_id=7225431807

Targets

    • Target

      Purchase Order 77809 for acknowledgment.exe

    • Size

      774KB

    • MD5

      5116b849c70cec7c2881af8dae1ba63d

    • SHA1

      19d4291c3b31ab1be7af94b144a3294d91b43934

    • SHA256

      da5672185bdcb791e426127091bc7da56812d6c6cba9fc6aca754e43b59834db

    • SHA512

      eff6c0a52e0d058b30d215f043688e5a62c791324fda0a4bbd8e13f29709a8d5a2a4a11f011684637fb025c60ef6acd4a8b05cd7d55d56f6f04c257f0f6dd998

    • SSDEEP

      24576:6aMRHPv6tkVKEd0wKq6EfzTX6gNrhEK4VoVBOwMRH:6aMZqaVKE2wFTX6ard3BOwMZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks