General

  • Target

    08A347B6-6FB3-4B5E-9A49-9EC1E49DF8F1.pdf.exe

  • Size

    552KB

  • Sample

    231011-x54tpsad85

  • MD5

    8e7ebf1bc39efd667d217a01b3ff4906

  • SHA1

    f1ca8a434bade6fc32ab7f1937406694197ff75c

  • SHA256

    378e803de5841cea84a1157ee59e6c64eb717674bded8dbcaa27621919552c90

  • SHA512

    7be4e2939848bfccd3eb8005298b6c90fdcc6580820952427033c77c693e95a01bf04f87181393f305cf3bcac0b24a54f88dfe2ee5ce931e56b3944bf4f8c047

  • SSDEEP

    12288:lV5U8fX9KCkemw55kO3XEiNpXdSGvAeqNH86fh8z3GOOM:xftBp3kiRNh1va865i2OOM

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      08A347B6-6FB3-4B5E-9A49-9EC1E49DF8F1.pdf.exe

    • Size

      552KB

    • MD5

      8e7ebf1bc39efd667d217a01b3ff4906

    • SHA1

      f1ca8a434bade6fc32ab7f1937406694197ff75c

    • SHA256

      378e803de5841cea84a1157ee59e6c64eb717674bded8dbcaa27621919552c90

    • SHA512

      7be4e2939848bfccd3eb8005298b6c90fdcc6580820952427033c77c693e95a01bf04f87181393f305cf3bcac0b24a54f88dfe2ee5ce931e56b3944bf4f8c047

    • SSDEEP

      12288:lV5U8fX9KCkemw55kO3XEiNpXdSGvAeqNH86fh8z3GOOM:xftBp3kiRNh1va865i2OOM

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks