General

  • Target

    Payment swift.pdf.exe

  • Size

    672KB

  • Sample

    220930-qf3f1sdfb6

  • MD5

    624528955b48acdf320239f06b1312d2

  • SHA1

    c7d83f276fbcb0dc9c8a92baa940ac391439d2b9

  • SHA256

    75bcb01c0ff496a6db0b158ae97e03840b29161d5c8f396c19ff92e46859810a

  • SHA512

    4891a0df0f690c939d4eaca7ccc41cad4b3f2314f76270322ea0c1fa2796de99ebbc887558c0b8df2ac5717c9bbee1091fbd84afb97ad1ecb7aa3861fdab9848

  • SSDEEP

    12288:EySiW0Yr50SAgFeZHjNl5+hbpadtZoKXTJ9AY22Eu8U+F:xWH0SFEl5+eeKXXXP8

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Payment swift.pdf.exe

    • Size

      672KB

    • MD5

      624528955b48acdf320239f06b1312d2

    • SHA1

      c7d83f276fbcb0dc9c8a92baa940ac391439d2b9

    • SHA256

      75bcb01c0ff496a6db0b158ae97e03840b29161d5c8f396c19ff92e46859810a

    • SHA512

      4891a0df0f690c939d4eaca7ccc41cad4b3f2314f76270322ea0c1fa2796de99ebbc887558c0b8df2ac5717c9bbee1091fbd84afb97ad1ecb7aa3861fdab9848

    • SSDEEP

      12288:EySiW0Yr50SAgFeZHjNl5+hbpadtZoKXTJ9AY22Eu8U+F:xWH0SFEl5+eeKXXXP8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks