General

  • Target

    PROFORMA INVOICE.pdf.exe

  • Size

    935KB

  • Sample

    221104-vp3wcshae8

  • MD5

    bbc670507beb28a487cbc9b1441f6611

  • SHA1

    22067cb494eb6923811929daad39ca4ddf881e1d

  • SHA256

    65d0c541425d117d3a7cae9f870b5d3b14968066e0d1af76a6a511b4022eae28

  • SHA512

    2f7d784193e8fae2ad4f5986d5b3ef6175550ecedb9a7caab88e33424b5a9860e99fdcdb140bf6cff83d0ec47009b0f6583b9aab791b2fb3a04131553e6941ae

  • SSDEEP

    12288:2wpL6ajmI9euStP7c/DuN9LJnM7klUKkRk0APfs2sFLTAehm8buS89W7Bm/2orYh:WGmI9ezIqN9lM7klfkRAd8TAqbD

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PROFORMA INVOICE.pdf.exe

    • Size

      935KB

    • MD5

      bbc670507beb28a487cbc9b1441f6611

    • SHA1

      22067cb494eb6923811929daad39ca4ddf881e1d

    • SHA256

      65d0c541425d117d3a7cae9f870b5d3b14968066e0d1af76a6a511b4022eae28

    • SHA512

      2f7d784193e8fae2ad4f5986d5b3ef6175550ecedb9a7caab88e33424b5a9860e99fdcdb140bf6cff83d0ec47009b0f6583b9aab791b2fb3a04131553e6941ae

    • SSDEEP

      12288:2wpL6ajmI9euStP7c/DuN9LJnM7klUKkRk0APfs2sFLTAehm8buS89W7Bm/2orYh:WGmI9ezIqN9lM7klfkRAd8TAqbD

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks