General

  • Target

    Payment Copy.exe

  • Size

    629KB

  • Sample

    221125-3w971sfh97

  • MD5

    92002937394958f5796bd2bd3afb7a6b

  • SHA1

    3d5101c8249bed253e4f9b6e560ea0fc656ceddc

  • SHA256

    d3884bc7ac4cec7f711e22e58c7010ade8ea78c996e222d37fa3258228cb9d44

  • SHA512

    55b327819e453baa2d886682cf3f9f179b6356b6a1b5d89989c16c9f7fbc609de1fce8912f3aee21c169d2ac681c4b8ce296e44b5aae063756bed0a2fe168047

  • SSDEEP

    12288:ucrK6bkon+LzvJn4z5RMPVxUjSC2mZJbxpDF:FrK6Qo+XJn8WPjDC2

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Payment Copy.exe

    • Size

      629KB

    • MD5

      92002937394958f5796bd2bd3afb7a6b

    • SHA1

      3d5101c8249bed253e4f9b6e560ea0fc656ceddc

    • SHA256

      d3884bc7ac4cec7f711e22e58c7010ade8ea78c996e222d37fa3258228cb9d44

    • SHA512

      55b327819e453baa2d886682cf3f9f179b6356b6a1b5d89989c16c9f7fbc609de1fce8912f3aee21c169d2ac681c4b8ce296e44b5aae063756bed0a2fe168047

    • SSDEEP

      12288:ucrK6bkon+LzvJn4z5RMPVxUjSC2mZJbxpDF:FrK6Qo+XJn8WPjDC2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks