General

  • Target

    SHDG0009000.exe

  • Size

    345KB

  • Sample

    230610-l3q92sfc9s

  • MD5

    734f19391aa55187a0e540af6e2b3637

  • SHA1

    dd94a19920398360fecfc7e79b4e194cd62f8e12

  • SHA256

    faa080e3c029ae675ef5c38b3884e171b70e2460f8df551a0764e06249ce349d

  • SHA512

    2956ca789af8bcfe88722bfe0b8ca49bbe8845d74d56f8d902b3018d62f49e940ee8d3a51be80064213c6fad253b43da94b92b37e75d98c5077b922ede2eb52e

  • SSDEEP

    6144:PYa6QVyvfLj2dX3m0ePci6R5FpcdFe7PjZ1UlZiqvfMKjRvSP8roc0m/YWg7XtwX:PYqMCHmDx61idFezjZ1ULi80KNKPUX0O

Malware Config

Targets

    • Target

      SHDG0009000.exe

    • Size

      345KB

    • MD5

      734f19391aa55187a0e540af6e2b3637

    • SHA1

      dd94a19920398360fecfc7e79b4e194cd62f8e12

    • SHA256

      faa080e3c029ae675ef5c38b3884e171b70e2460f8df551a0764e06249ce349d

    • SHA512

      2956ca789af8bcfe88722bfe0b8ca49bbe8845d74d56f8d902b3018d62f49e940ee8d3a51be80064213c6fad253b43da94b92b37e75d98c5077b922ede2eb52e

    • SSDEEP

      6144:PYa6QVyvfLj2dX3m0ePci6R5FpcdFe7PjZ1UlZiqvfMKjRvSP8roc0m/YWg7XtwX:PYqMCHmDx61idFezjZ1ULi80KNKPUX0O

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks