General

  • Target

    PURCHASE DRAFT 01072024.exe

  • Size

    467KB

  • Sample

    240701-td7jqsyanc

  • MD5

    29e1467e979c85abfbdd3da6b09e6c16

  • SHA1

    9cfa0ebefbc7ae0a2a87c255cae34c9e3ce239c5

  • SHA256

    449bf249c170a1b3275c2a3ed45292244ecb49bf3be24ccef3809330de252d90

  • SHA512

    00d7f1882e48222a94107b01734c4225461c28b39e7ff67597061360a1965b278962d3020406f4bcd6d38609d61e687f1b17e4f11735fc98697252bf0b17d79b

  • SSDEEP

    6144:Ddnrsfcv+Q3KGZ+tJm5RliVL4KciREqBQPzF+eanHuU0LIyv5Vl0xq:KgkXm5zibmqBQPzEeqOUgHxB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7169426142:AAG_Nuf4vFdD3YALIW-rE-UaNUDVey15SPM/sendMessage?chat_id=1545867115

Targets

    • Target

      PURCHASE DRAFT 01072024.exe

    • Size

      467KB

    • MD5

      29e1467e979c85abfbdd3da6b09e6c16

    • SHA1

      9cfa0ebefbc7ae0a2a87c255cae34c9e3ce239c5

    • SHA256

      449bf249c170a1b3275c2a3ed45292244ecb49bf3be24ccef3809330de252d90

    • SHA512

      00d7f1882e48222a94107b01734c4225461c28b39e7ff67597061360a1965b278962d3020406f4bcd6d38609d61e687f1b17e4f11735fc98697252bf0b17d79b

    • SSDEEP

      6144:Ddnrsfcv+Q3KGZ+tJm5RliVL4KciREqBQPzF+eanHuU0LIyv5Vl0xq:KgkXm5zibmqBQPzEeqOUgHxB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Disables RegEdit via registry modification

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks