General

  • Target

    DHL AWB 5016240033.exe

  • Size

    609KB

  • Sample

    230802-kwky1sdg63

  • MD5

    0a24f265c64fd296e6d7cb4e0e291518

  • SHA1

    5f676ce8451a1f7274cf37d753c7e0f772e9890c

  • SHA256

    065422f5a2797ef0b64e40890c4b00d60c2edda5bef5a73a6eb361ec8a81baa9

  • SHA512

    ed66a816100369dda7a4266f68ba82432b641b2c866bb9da7efb55990c8355dee74c8265560f0dd7c54694aadaa1221d835ee3fb06c07654b48cdca9f2752bca

  • SSDEEP

    12288:5+uZdrYmJ+37pZa9Jbr3CZap6LSt5GDNCHBe3fiSYwYAKw1V0n8aPaN:5+uDrYmQ37pZa9Jb7Ich5Gkhe31jew1X

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      DHL AWB 5016240033.exe

    • Size

      609KB

    • MD5

      0a24f265c64fd296e6d7cb4e0e291518

    • SHA1

      5f676ce8451a1f7274cf37d753c7e0f772e9890c

    • SHA256

      065422f5a2797ef0b64e40890c4b00d60c2edda5bef5a73a6eb361ec8a81baa9

    • SHA512

      ed66a816100369dda7a4266f68ba82432b641b2c866bb9da7efb55990c8355dee74c8265560f0dd7c54694aadaa1221d835ee3fb06c07654b48cdca9f2752bca

    • SSDEEP

      12288:5+uZdrYmJ+37pZa9Jbr3CZap6LSt5GDNCHBe3fiSYwYAKw1V0n8aPaN:5+uDrYmQ37pZa9Jb7Ich5Gkhe31jew1X

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks