General

  • Target

    ProcessingIConnect.Common..TermsConditions.z.pdf.exe

  • Size

    793KB

  • Sample

    210201-dkkecj77vn

  • MD5

    17f63f3534c4609b3412f0a258eb5788

  • SHA1

    76bb799be2bf37a13f7b24c5c780887cec6a81d8

  • SHA256

    ff97d75f4e260215c3894bad7ca8423b5d9bbda16d89e4b8b4aaf50c4c26d82a

  • SHA512

    47ebd1f5e792b1cff28ab87a25dbe4145355f4412a6a8235d766ea03b39c616d112eae5b61c1ccdcd27cf7a05bd4b45ec51176841684de9e48179035f188bac8

Malware Config

Targets

    • Target

      ProcessingIConnect.Common..TermsConditions.z.pdf.exe

    • Size

      793KB

    • MD5

      17f63f3534c4609b3412f0a258eb5788

    • SHA1

      76bb799be2bf37a13f7b24c5c780887cec6a81d8

    • SHA256

      ff97d75f4e260215c3894bad7ca8423b5d9bbda16d89e4b8b4aaf50c4c26d82a

    • SHA512

      47ebd1f5e792b1cff28ab87a25dbe4145355f4412a6a8235d766ea03b39c616d112eae5b61c1ccdcd27cf7a05bd4b45ec51176841684de9e48179035f188bac8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks