General

  • Target

    TBN PDA quotation for discharging cement_pdf.exe

  • Size

    1.0MB

  • Sample

    231006-v9jm8agg84

  • MD5

    b74a162efe4f52f43cc67d126c2f8d77

  • SHA1

    f01917d3ac9397cf878d389b34da3d738894b627

  • SHA256

    2bc4b7908e49fb1b4bcee9fd51702a318423945423b88ce55dd28ef949e2ed27

  • SHA512

    446efc78726d511c79daae46449c19e96aefddeb1d08914f4e207b28377837a004bf0b87b46025a18845704af613651e273485d356e5e646946a92af711831f8

  • SSDEEP

    24576:q1ChsCThcQJJTrYJlLs+vjKBUbgh5jBcxG:qwyClcOJTEJNgVFc

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      TBN PDA quotation for discharging cement_pdf.exe

    • Size

      1.0MB

    • MD5

      b74a162efe4f52f43cc67d126c2f8d77

    • SHA1

      f01917d3ac9397cf878d389b34da3d738894b627

    • SHA256

      2bc4b7908e49fb1b4bcee9fd51702a318423945423b88ce55dd28ef949e2ed27

    • SHA512

      446efc78726d511c79daae46449c19e96aefddeb1d08914f4e207b28377837a004bf0b87b46025a18845704af613651e273485d356e5e646946a92af711831f8

    • SSDEEP

      24576:q1ChsCThcQJJTrYJlLs+vjKBUbgh5jBcxG:qwyClcOJTEJNgVFc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks