General

  • Target

    Quarantined Messages (5).zip

  • Size

    538KB

  • Sample

    221020-qq5dcsfdbl

  • MD5

    1da3375caf5b7de1ceef9b74a4402477

  • SHA1

    b58cd7e6ee04b2f2529c94ce0f7c93c9e654d20b

  • SHA256

    b122631c5b2234417f0043256848e6d2424c9abd7c58d229460629b13d12a171

  • SHA512

    87e5f8c6157475841dc8da0842f08f9878e453bb6780f18b2760e9ecb6478fb4f9b08710e2a1720c089b98969c6c8c802f922419f676b962d46bf8389f45ff9d

  • SSDEEP

    12288:DHI5AmHA4zZuPhiSEhmLd3f1fKKBW+sq0NtQmNi8nilR3Z:Do5AmHSv0mL91fKKByNtVg

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      REQUEST FOR QUOTE.exe

    • Size

      836KB

    • MD5

      0d965c09e78c8d3143d65f818ea94665

    • SHA1

      833a6c5e2b247f7d343493ae55ee259e41dca1c4

    • SHA256

      48e86244539459ac6321572a9163170c10e2c2f4c0ed13a974e569f13d8587b9

    • SHA512

      e0bf9931f38862edffd4b089acfb93eb32311d5e9e5512917febd602edeb8cbaf9cc9853dd8f0770f0939394cc787c85bb36d43c9c1e8cb41674bdc7dea7b2c7

    • SSDEEP

      12288:jLkIMvqV2fEuBk5HJ5UuVWVF/WnSZwIJD+yd48K5zA88E1ytyktf:vkI9NJGuVPSZwIJDRdrK5zAJE1+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks