Good day everyone!
Fortinet's FortiGuard Labs discovered a new variant of the #Snake keylogger, a.k.a. "404 Keylogger". According to the report most of the detections from their "FortiSandbox" have come from China, Turkey, Indonesia, Taiwan, and Spain but if you aren't from these countries, you still may be a target!
Behaviors (MITRE ATT&CK):
Persistence - TA0003:
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder - After the malware is executed and drops a copy of itself in the %Local_AppData%\supergroup directory then copies itself the the %Startup% folder.
Defense Evasion - TA0005:
Process Injection: Process Hollowing T1055.012 - The malware injects itself into a legitimate .NET process, in this sample it was RegSvcs.exe. This allowed it to run within a trusted process to evade detection.
Command And Control - TA0011:
Application Layer Protocol: Web Protocols - T1071.001
Application Layer Protocol: Mail Protocols - T1071.003
The malware used multiple techniques to upload stolen credentials. The researchers observed SMTP, Telegram bots, and HTTP Post requests to transmit the data.
As usual, go check out the research for yourself to check out the details that I left out and support the good work! Enjoy and Happy Hunting!
FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant
https://www.fortinet.com/blog/threat-research/fortisandbox-detects-evolving-snake-keylogger-variant
Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday