General

  • Target

    Shipment Invoice.exe

  • Size

    836KB

  • Sample

    221011-wwzyqahaa2

  • MD5

    7e760e5843c87da09e42d782ec8917f6

  • SHA1

    ee963befdf3116b78126d03db5dc49307da29ce8

  • SHA256

    82fc274736d5f4e6fefd8a01f3b2557b242918db92d8f3a479ab087b3fdfc66f

  • SHA512

    d1e960d946f5a98204fdda46fa0d28eab8c8110b710f95993ace505ccd9f2ffc2a1ef38e5088439e0f0d68e8b1cd35a3c159fc13dbef35a64c59462afa6de0d3

  • SSDEEP

    12288:/7K8uqWOu5wQKlg4qDQYHam937YrX4QL1myZ576yzeFYZr:/sf5wFa4WQY6m9UfU055e

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Shipment Invoice.exe

    • Size

      836KB

    • MD5

      7e760e5843c87da09e42d782ec8917f6

    • SHA1

      ee963befdf3116b78126d03db5dc49307da29ce8

    • SHA256

      82fc274736d5f4e6fefd8a01f3b2557b242918db92d8f3a479ab087b3fdfc66f

    • SHA512

      d1e960d946f5a98204fdda46fa0d28eab8c8110b710f95993ace505ccd9f2ffc2a1ef38e5088439e0f0d68e8b1cd35a3c159fc13dbef35a64c59462afa6de0d3

    • SSDEEP

      12288:/7K8uqWOu5wQKlg4qDQYHam937YrX4QL1myZ576yzeFYZr:/sf5wFa4WQY6m9UfU055e

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks