General

  • Target

    DHL AWB 50162400320.exe

  • Size

    573KB

  • Sample

    230721-gjk7gacb82

  • MD5

    1d0ebe153341e132674edcf7743bf63e

  • SHA1

    b8f545e6d0917617ad0dce5f71ab0d281859896c

  • SHA256

    483e84a77ca4e74640b316a98439432e1a795e0c003ab62064e3b00e143c0bb9

  • SHA512

    448259472ff2457d4843bc64a6dc01f6a7f78a7b33d7dbe6be61e04a8f95037a9094dcfa3a9bbdb95c87263165229de60bdb38fe36183286728c9a78762ea8f2

  • SSDEEP

    12288:TS6ln+flo/XciMv6tSnkZOM8v3tpHgx0r06amEbGqHyUCNLF8BnGpU:OTdCjE6MnkIfv3tpHX06tgGqMNyxGp

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      DHL AWB 50162400320.exe

    • Size

      573KB

    • MD5

      1d0ebe153341e132674edcf7743bf63e

    • SHA1

      b8f545e6d0917617ad0dce5f71ab0d281859896c

    • SHA256

      483e84a77ca4e74640b316a98439432e1a795e0c003ab62064e3b00e143c0bb9

    • SHA512

      448259472ff2457d4843bc64a6dc01f6a7f78a7b33d7dbe6be61e04a8f95037a9094dcfa3a9bbdb95c87263165229de60bdb38fe36183286728c9a78762ea8f2

    • SSDEEP

      12288:TS6ln+flo/XciMv6tSnkZOM8v3tpHgx0r06amEbGqHyUCNLF8BnGpU:OTdCjE6MnkIfv3tpHX06tgGqMNyxGp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks