General

  • Target

    SIPARIS-270624.exe

  • Size

    26KB

  • Sample

    240627-m33hraxfrc

  • MD5

    3a518d667edf1b7e38bef02c9aa2e74e

  • SHA1

    0ea5ca2b196f96fa6d6112c3771f3c132c124ff9

  • SHA256

    68930f6edf4c46201668adc5b0f91008e1914b6fdb60742c0d60c9b5162a3acf

  • SHA512

    648d9e2fda98fd2e47342885c7a250f1e37353c5f0cf9ee6027c0ffa073e57cc34574bab40d2291e7af0b66a3da014f16858d7be9d9542c28786133b5d7004a9

  • SSDEEP

    384:nqJNd2S1m0rRdZaE585ywpUWFo8nwpcEBbW1F3HSR5ScyuHkZhpxsFreAxzy:4m0rDVu5yGfo8kGevcpxs3zy

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SIPARIS-270624.exe

    • Size

      26KB

    • MD5

      3a518d667edf1b7e38bef02c9aa2e74e

    • SHA1

      0ea5ca2b196f96fa6d6112c3771f3c132c124ff9

    • SHA256

      68930f6edf4c46201668adc5b0f91008e1914b6fdb60742c0d60c9b5162a3acf

    • SHA512

      648d9e2fda98fd2e47342885c7a250f1e37353c5f0cf9ee6027c0ffa073e57cc34574bab40d2291e7af0b66a3da014f16858d7be9d9542c28786133b5d7004a9

    • SSDEEP

      384:nqJNd2S1m0rRdZaE585ywpUWFo8nwpcEBbW1F3HSR5ScyuHkZhpxsFreAxzy:4m0rDVu5yGfo8kGevcpxs3zy

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks