General

  • Target

    6d592f2214ae13601c1658e2fa60f9695f83d009f14a49f5bff59ac128d6b4e3

  • Size

    358KB

  • Sample

    230605-cv736aee92

  • MD5

    4d5eeed96ec9a0d63261c9e980f06b03

  • SHA1

    93a1c21f7187ae3fa2d73d1e61efb3cbd109cebb

  • SHA256

    6d592f2214ae13601c1658e2fa60f9695f83d009f14a49f5bff59ac128d6b4e3

  • SHA512

    4279d331e8178e7d0d784cfc4ebac2e83a2c299c65fcf3213873fb003688d01dbb191468b7f2d2db17c521617cafc8ac32638ab070b5bec7b542e1a365c73d06

  • SSDEEP

    6144:3PRx8z311ZPqhyHdp5NZfRafLaY3GbbYLqg:3PC5dH/FfRafLaY3G3Y2g

Malware Config

Targets

    • Target

      6d592f2214ae13601c1658e2fa60f9695f83d009f14a49f5bff59ac128d6b4e3

    • Size

      358KB

    • MD5

      4d5eeed96ec9a0d63261c9e980f06b03

    • SHA1

      93a1c21f7187ae3fa2d73d1e61efb3cbd109cebb

    • SHA256

      6d592f2214ae13601c1658e2fa60f9695f83d009f14a49f5bff59ac128d6b4e3

    • SHA512

      4279d331e8178e7d0d784cfc4ebac2e83a2c299c65fcf3213873fb003688d01dbb191468b7f2d2db17c521617cafc8ac32638ab070b5bec7b542e1a365c73d06

    • SSDEEP

      6144:3PRx8z311ZPqhyHdp5NZfRafLaY3GbbYLqg:3PC5dH/FfRafLaY3G3Y2g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks