General

  • Target

    OVER DUE INVOICE PAYMENT.docx

  • Size

    16KB

  • Sample

    240704-dktcpatakh

  • MD5

    9f3fd4e8aa2ad81966d0c2a036d1e901

  • SHA1

    80a58393acb58fcc666e56b514994d98ba3f4716

  • SHA256

    cd9cf022180c8c6f6c4fb0d76476bf2e9382128d28a4686114c50448934e5381

  • SHA512

    1f97f830da19d686d8a41f8be36809fbd245f8720835561730dd10bf7cbefe03f17e77df32c0d9c1333084fb598f718fec3ad69f6d7c9313a139b7faa872a7c1

  • SSDEEP

    384:3oyX8glCWUs8PL8wi4OEwH8TIbE91r2fRgJY7viL6CnUaV:Yc8xv5P3DOqnYJu2vq6CnB

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.artefes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ArtEfes4765*+

Targets

    • Target

      OVER DUE INVOICE PAYMENT.docx

    • Size

      16KB

    • MD5

      9f3fd4e8aa2ad81966d0c2a036d1e901

    • SHA1

      80a58393acb58fcc666e56b514994d98ba3f4716

    • SHA256

      cd9cf022180c8c6f6c4fb0d76476bf2e9382128d28a4686114c50448934e5381

    • SHA512

      1f97f830da19d686d8a41f8be36809fbd245f8720835561730dd10bf7cbefe03f17e77df32c0d9c1333084fb598f718fec3ad69f6d7c9313a139b7faa872a7c1

    • SSDEEP

      384:3oyX8glCWUs8PL8wi4OEwH8TIbE91r2fRgJY7viL6CnUaV:Yc8xv5P3DOqnYJu2vq6CnB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks