General

  • Target

    RFQ Document.exe

  • Size

    336KB

  • Sample

    210928-gh1wjaafe9

  • MD5

    64468b2ab541687572ce6b435b41f2bd

  • SHA1

    893ae234d351c762ab388a7337c625e4b213da6e

  • SHA256

    d3ac98cf64ca2fca455b2e4f002c3381bcee699cf64bbfaa076222209f834b1a

  • SHA512

    317c14df6c6d1dd3b120a28743eface80474d7140515d61d0a00c326a923f56c71d7135907e2c2d5f17cba1b5746bb19ae5262cf656a098ebd94adba82cc2db8

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1926537393:AAHGSUhtLeQU8qms_2blDH9qpvo-fEuwi9E/sendMessage?chat_id=1664748411

Targets

    • Target

      RFQ Document.exe

    • Size

      336KB

    • MD5

      64468b2ab541687572ce6b435b41f2bd

    • SHA1

      893ae234d351c762ab388a7337c625e4b213da6e

    • SHA256

      d3ac98cf64ca2fca455b2e4f002c3381bcee699cf64bbfaa076222209f834b1a

    • SHA512

      317c14df6c6d1dd3b120a28743eface80474d7140515d61d0a00c326a923f56c71d7135907e2c2d5f17cba1b5746bb19ae5262cf656a098ebd94adba82cc2db8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks