General

  • Target

    8b940b0dd714db5a7b92e84b981b4196e9b82dc927df62f7104f3243bf68d223

  • Size

    769KB

  • Sample

    221122-t212vsab74

  • MD5

    2b620b27b3efe0e9e1a9323c007f1605

  • SHA1

    4e071f65e65c92565ff542f576bb101b47896a4c

  • SHA256

    968247f6c6bf6be649b509423723030a2b4e0c201569524b45892609fefbe0c2

  • SHA512

    79435c9ca04130cc6e52ad86b3ff3c3041431db170c58072895ccc3a6656abb23712210c046153de49caa218e31e234ee69bc1ac80df7cf521f8749ea449facb

  • SSDEEP

    12288:UXVqInobrcpbb6xjBnKCbgmv5vNoNgy3IHePefb2J6euRsjYZ3NJ28suX:UjnobruX6xFnKCbiNgWQu6euajs1sk

Malware Config

Targets

    • Target

      8b940b0dd714db5a7b92e84b981b4196e9b82dc927df62f7104f3243bf68d223

    • Size

      962KB

    • MD5

      2e5fb8c23db0a0d9cdd1c1e8793833ef

    • SHA1

      f4876ad1d310c9f509147ccb335fc5bcf7e1c19d

    • SHA256

      8b940b0dd714db5a7b92e84b981b4196e9b82dc927df62f7104f3243bf68d223

    • SHA512

      c6aadaa2c86bbf4596b47121b550717d51603779a17dd8f3b96a989c9f0c4cb6d2164f49bcd693bb7afd720e6f13fcbebe58b2277cc14e1215a067dfe57c6819

    • SSDEEP

      24576:j1ublbZuX4xxne6bg/kK4u8eYhvKqdOF:jylbM4xJikKvYhiqdO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks