General

  • Target

    Confirmación de recibo de transferencia.exe

  • Size

    640KB

  • Sample

    230425-sy5p7sbb38

  • MD5

    fa023b2ab25eb6370a8776c8a94de7a7

  • SHA1

    94dad9c18b4098abecd0ef367d68e393dc5e9173

  • SHA256

    916813387ba52a892f9a9f10f3d709745bedf80adacd9e2c42869a1131535612

  • SHA512

    609d898602ac0d9385464eafe3e717d0a99357921acac0da43ce2846a5329197eb4ab1dea31f998633938020de9ad42a94db91ae5d66083c52f59a63dd552dac

  • SSDEEP

    12288:4xm+vY07/NBDiJpbY2Mo7YENsaMrtZForsk1lDuZGZ2SSGS:Ym0/NBWprM6zNi/yrV15uv3

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Confirmación de recibo de transferencia.exe

    • Size

      640KB

    • MD5

      fa023b2ab25eb6370a8776c8a94de7a7

    • SHA1

      94dad9c18b4098abecd0ef367d68e393dc5e9173

    • SHA256

      916813387ba52a892f9a9f10f3d709745bedf80adacd9e2c42869a1131535612

    • SHA512

      609d898602ac0d9385464eafe3e717d0a99357921acac0da43ce2846a5329197eb4ab1dea31f998633938020de9ad42a94db91ae5d66083c52f59a63dd552dac

    • SSDEEP

      12288:4xm+vY07/NBDiJpbY2Mo7YENsaMrtZForsk1lDuZGZ2SSGS:Ym0/NBWprM6zNi/yrV15uv3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks