General

  • Target

    23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f

  • Size

    153KB

  • Sample

    230606-esb9tace7w

  • MD5

    650de0e3d5a76ee569312726b2ccd79e

  • SHA1

    5e11c60e34e4646f6fcfc210709c8a4c83e37ec9

  • SHA256

    23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f

  • SHA512

    d248cc963f4ce1c5034bb9c7e0971b1607b2228a71b60e8880eeff17f06797b47db63ca5b2568e9f8b9554e468a32e27930c926e2fcb4b82e10590e2ef11a2b3

  • SSDEEP

    3072:SVQAASLDjgl/8mgT9O4sP3fxEdXVCP9mPc7X9tMHjCSI8KGLQT3:SqA7LD6/6T9O/v+X56MOSI8KGLQT

Malware Config

Targets

    • Target

      23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f

    • Size

      153KB

    • MD5

      650de0e3d5a76ee569312726b2ccd79e

    • SHA1

      5e11c60e34e4646f6fcfc210709c8a4c83e37ec9

    • SHA256

      23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f

    • SHA512

      d248cc963f4ce1c5034bb9c7e0971b1607b2228a71b60e8880eeff17f06797b47db63ca5b2568e9f8b9554e468a32e27930c926e2fcb4b82e10590e2ef11a2b3

    • SSDEEP

      3072:SVQAASLDjgl/8mgT9O4sP3fxEdXVCP9mPc7X9tMHjCSI8KGLQT3:SqA7LD6/6T9O/v+X56MOSI8KGLQT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks