General

  • Target

    order details.exe

  • Size

    623KB

  • Sample

    230511-w52tnshb23

  • MD5

    fa4fb7b2b984ba67297985696bc2f393

  • SHA1

    747fd5fd2f007269cd437dc5d91956d66cce8d88

  • SHA256

    29eab90d00959df3bc7e2699823e8521eec34be6a967e52fe6d71f519ed16ad8

  • SHA512

    42cc988297a5b221b8b2c34d3b55d1039401bca6dbff3264ef6f8645c920ca99dc693e826cba526022b2b1151c3ab820699ae857a6f5acdecc06f758eeb7a425

  • SSDEEP

    12288:jmYCfCFzee/cqoTvl3FIcca27p8knmp/dlBlhdGa6vJt:jmNqRoFTt3FIfanknML

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      order details.exe

    • Size

      623KB

    • MD5

      fa4fb7b2b984ba67297985696bc2f393

    • SHA1

      747fd5fd2f007269cd437dc5d91956d66cce8d88

    • SHA256

      29eab90d00959df3bc7e2699823e8521eec34be6a967e52fe6d71f519ed16ad8

    • SHA512

      42cc988297a5b221b8b2c34d3b55d1039401bca6dbff3264ef6f8645c920ca99dc693e826cba526022b2b1151c3ab820699ae857a6f5acdecc06f758eeb7a425

    • SSDEEP

      12288:jmYCfCFzee/cqoTvl3FIcca27p8knmp/dlBlhdGa6vJt:jmNqRoFTt3FIfanknML

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks