General

  • Target

    41130c6ae73f211bab65e86f956f2c11ea1455089d21b5f18316353e5e370437.exe

  • Size

    1008KB

  • Sample

    221121-v3tjvaee6s

  • MD5

    860c60db91b09c980f5d218c2c4f9afa

  • SHA1

    d9bf36695ffd24239bd25720f46d0711f2e8e8ad

  • SHA256

    41130c6ae73f211bab65e86f956f2c11ea1455089d21b5f18316353e5e370437

  • SHA512

    104619d936aec7a6e796394cd044d4dad85b4dd696cf3ca6055527b7d3216070ad6bf8fecbd0969d33f0ee4c3039c03072969a3a5f64b3f9d8a25c74124f954a

  • SSDEEP

    24576:4k316LEuJ7PTi/k47sLwRHy3yd+L74mBfNUstzoY:4rJ7PTi/k47sLwZy3

Malware Config

Targets

    • Target

      41130c6ae73f211bab65e86f956f2c11ea1455089d21b5f18316353e5e370437.exe

    • Size

      1008KB

    • MD5

      860c60db91b09c980f5d218c2c4f9afa

    • SHA1

      d9bf36695ffd24239bd25720f46d0711f2e8e8ad

    • SHA256

      41130c6ae73f211bab65e86f956f2c11ea1455089d21b5f18316353e5e370437

    • SHA512

      104619d936aec7a6e796394cd044d4dad85b4dd696cf3ca6055527b7d3216070ad6bf8fecbd0969d33f0ee4c3039c03072969a3a5f64b3f9d8a25c74124f954a

    • SSDEEP

      24576:4k316LEuJ7PTi/k47sLwRHy3yd+L74mBfNUstzoY:4rJ7PTi/k47sLwZy3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks