General

  • Target

    f99b9801f01ee7b4b5ca8512e4e7ddaed8cadddde95c3f0ecbd217fc5620fbca

  • Size

    416KB

  • Sample

    221125-j57cyadb89

  • MD5

    b8259ed6a4fd55a02c9740361cc2db3d

  • SHA1

    d9ecc123a139e9900d88a0eda4ad5c78f2a3214c

  • SHA256

    f99b9801f01ee7b4b5ca8512e4e7ddaed8cadddde95c3f0ecbd217fc5620fbca

  • SHA512

    280439e8a794e437dbebbf8a408498b7028914abb18b4ba24071c22e5ee29bd77adc1b210b0de6968c9db0f32fa47cffad4e2689c754587b028442d40a67d305

  • SSDEEP

    1536:76BrBvzYJ7/4RzeeptZrd8FjGhDji2KGtc8w0N1rlmVcl:76oJYzHZx8FCDXncszJ8Y

Malware Config

Targets

    • Target

      f99b9801f01ee7b4b5ca8512e4e7ddaed8cadddde95c3f0ecbd217fc5620fbca

    • Size

      416KB

    • MD5

      b8259ed6a4fd55a02c9740361cc2db3d

    • SHA1

      d9ecc123a139e9900d88a0eda4ad5c78f2a3214c

    • SHA256

      f99b9801f01ee7b4b5ca8512e4e7ddaed8cadddde95c3f0ecbd217fc5620fbca

    • SHA512

      280439e8a794e437dbebbf8a408498b7028914abb18b4ba24071c22e5ee29bd77adc1b210b0de6968c9db0f32fa47cffad4e2689c754587b028442d40a67d305

    • SSDEEP

      1536:76BrBvzYJ7/4RzeeptZrd8FjGhDji2KGtc8w0N1rlmVcl:76oJYzHZx8FCDXncszJ8Y

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks