General

  • Target

    REQUEST FOR QUOTATION E230830F2.exe

  • Size

    560KB

  • Sample

    231012-tyv2fabc9y

  • MD5

    5bef2b26267e7cfbc2d8c02404627ccd

  • SHA1

    8ee2fe6bb21ff176100bc9403e060a4aa2021403

  • SHA256

    de3b0df29cca773ff488c9e27f051b767fa7bd93ae9fedd5db91037de48615ca

  • SHA512

    386bf359c6c6acc6ea0071c24efd7f1beea3930c1c2045c0c6c71fd1f8f2ca1caeb1506c1c0aca24abe022c7ad061a3d1a5531aa74b52f9578f931ffa0aad6fe

  • SSDEEP

    12288:kY2AfDuHOXDAMfAkcOJJy5CoKHLw+wEcryuleCWp8N7:kY2gxf2OXy5CoCLJwyule

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      REQUEST FOR QUOTATION E230830F2.exe

    • Size

      560KB

    • MD5

      5bef2b26267e7cfbc2d8c02404627ccd

    • SHA1

      8ee2fe6bb21ff176100bc9403e060a4aa2021403

    • SHA256

      de3b0df29cca773ff488c9e27f051b767fa7bd93ae9fedd5db91037de48615ca

    • SHA512

      386bf359c6c6acc6ea0071c24efd7f1beea3930c1c2045c0c6c71fd1f8f2ca1caeb1506c1c0aca24abe022c7ad061a3d1a5531aa74b52f9578f931ffa0aad6fe

    • SSDEEP

      12288:kY2AfDuHOXDAMfAkcOJJy5CoKHLw+wEcryuleCWp8N7:kY2gxf2OXy5CoCLJwyule

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks