General

  • Target

    08A347B6-6FB3-4B5E-9A49-9EC1E49DF8F1.pdf.exe

  • Size

    610KB

  • Sample

    231011-x7f6esgg8z

  • MD5

    5636aab70daf85f7578b60fb7e504c6b

  • SHA1

    bb65bdf417bce4de922db81a6e99d509a1990236

  • SHA256

    8fdfe5bcc7f4ae9810621398a1a46fcf84e93c71c2c841b3c2d8463e9627982f

  • SHA512

    e7ed6698c7415c962bcb0c3e1f677e438a8e16c4794cc9cd412a8d6f2631c6324c18020ce23db473f281e45f5f9143e3d13cf8612f2ddbf8e14af3316dbe6a7f

  • SSDEEP

    12288:ecX9Kn46dkpV8SFZL+B0j6SHPn2WhqoK9:ectY4x8SFIB45/2Tb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      08A347B6-6FB3-4B5E-9A49-9EC1E49DF8F1.pdf.exe

    • Size

      610KB

    • MD5

      5636aab70daf85f7578b60fb7e504c6b

    • SHA1

      bb65bdf417bce4de922db81a6e99d509a1990236

    • SHA256

      8fdfe5bcc7f4ae9810621398a1a46fcf84e93c71c2c841b3c2d8463e9627982f

    • SHA512

      e7ed6698c7415c962bcb0c3e1f677e438a8e16c4794cc9cd412a8d6f2631c6324c18020ce23db473f281e45f5f9143e3d13cf8612f2ddbf8e14af3316dbe6a7f

    • SSDEEP

      12288:ecX9Kn46dkpV8SFZL+B0j6SHPn2WhqoK9:ectY4x8SFIB45/2Tb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks