General

  • Target

    7.exe

  • Size

    959KB

  • Sample

    230608-r2jfpsgb29

  • MD5

    99010472214061636608e4c5eb72f001

  • SHA1

    05b8d65f6435f19635b3d872d338486fd423f5bc

  • SHA256

    d2f61bd1ced74ab1985fe4624d95aaf81bb5277622130a4d7672e06c8bf71f61

  • SHA512

    963ec5d8623a4c0b81434d06a596512223d7d6668b57d49f1d55b0a8ca595734cae04300751b92e1f224e1f7796ae16e284d31aa6fdc6514ebfd9b3f0a1578e0

  • SSDEEP

    24576:ZYDXEaOyl8Hc/AWMDjHcoa2dSF2SEN+F8aD+dtooCiz:mwaOy6HcLA5a2AcZaydyE

Malware Config

Targets

    • Target

      7.exe

    • Size

      959KB

    • MD5

      99010472214061636608e4c5eb72f001

    • SHA1

      05b8d65f6435f19635b3d872d338486fd423f5bc

    • SHA256

      d2f61bd1ced74ab1985fe4624d95aaf81bb5277622130a4d7672e06c8bf71f61

    • SHA512

      963ec5d8623a4c0b81434d06a596512223d7d6668b57d49f1d55b0a8ca595734cae04300751b92e1f224e1f7796ae16e284d31aa6fdc6514ebfd9b3f0a1578e0

    • SSDEEP

      24576:ZYDXEaOyl8Hc/AWMDjHcoa2dSF2SEN+F8aD+dtooCiz:mwaOy6HcLA5a2AcZaydyE

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks