General

  • Target

    018ccb52b75e10cd4a45aa22aa7b2342.exe

  • Size

    304KB

  • Sample

    231011-htblfsag23

  • MD5

    018ccb52b75e10cd4a45aa22aa7b2342

  • SHA1

    7f0033b4a3958e14d1959555bbfbd58e667d460b

  • SHA256

    085432a1c99fa59ffaf3838e1a987e17df690bfd19fe6ad001ee7d9d6fba3eb4

  • SHA512

    13497efa83635329a0381f5e447bd47bd29bf7d1634c3909cb0537148d54e348c1455faa6b0246365d165eb1626a65a21acd410d70309ba40bfd6f73ef4c1e8f

  • SSDEEP

    6144:hnPdudwDvX6XTt3LWygobl2qgZbyWI2ku6nQ+i1ic3OYBsXA7L:hnPdj6ZKygjq0IZnK1wYMy

Malware Config

Targets

    • Target

      018ccb52b75e10cd4a45aa22aa7b2342.exe

    • Size

      304KB

    • MD5

      018ccb52b75e10cd4a45aa22aa7b2342

    • SHA1

      7f0033b4a3958e14d1959555bbfbd58e667d460b

    • SHA256

      085432a1c99fa59ffaf3838e1a987e17df690bfd19fe6ad001ee7d9d6fba3eb4

    • SHA512

      13497efa83635329a0381f5e447bd47bd29bf7d1634c3909cb0537148d54e348c1455faa6b0246365d165eb1626a65a21acd410d70309ba40bfd6f73ef4c1e8f

    • SSDEEP

      6144:hnPdudwDvX6XTt3LWygobl2qgZbyWI2ku6nQ+i1ic3OYBsXA7L:hnPdj6ZKygjq0IZnK1wYMy

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks