General

  • Target

     Payment Advice.PDF.exe

  • Size

    329KB

  • Sample

    231026-mb2r5sec4t

  • MD5

    9e6b1fdb47d280b886a9c66c4363a60c

  • SHA1

    3cb3539f61feaf0e1bf13f92d4a05d902d41da9b

  • SHA256

    6c85b7d283e61adeb841aaa3ddb0b5c8ad1ca6650df408ed03f0a874cf221971

  • SHA512

    a4f7a5477fc3a5fe69444e6a1a1a4d78ffc4677837fa4f2d9c2efea7400171f7de695c61f3afdf6c95c31bed28713924e48dcf535dfc3bc3a4b60690d28367e5

  • SSDEEP

    6144:/CKYBMNit2boZ2L/icl4iPJvGy+FsPe35bgaGPEQD:/fY6BboZ+/icCcGvL35bgaGf

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

       Payment Advice.PDF.exe

    • Size

      329KB

    • MD5

      9e6b1fdb47d280b886a9c66c4363a60c

    • SHA1

      3cb3539f61feaf0e1bf13f92d4a05d902d41da9b

    • SHA256

      6c85b7d283e61adeb841aaa3ddb0b5c8ad1ca6650df408ed03f0a874cf221971

    • SHA512

      a4f7a5477fc3a5fe69444e6a1a1a4d78ffc4677837fa4f2d9c2efea7400171f7de695c61f3afdf6c95c31bed28713924e48dcf535dfc3bc3a4b60690d28367e5

    • SSDEEP

      6144:/CKYBMNit2boZ2L/icl4iPJvGy+FsPe35bgaGPEQD:/fY6BboZ+/icCcGvL35bgaGf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks