General

  • Target

    PO ORDER-2311-0145.exe

  • Size

    367KB

  • Sample

    231113-hd24gaah2w

  • MD5

    4557b75c3f8dfc2a31ff0e8e56792653

  • SHA1

    d348497a1ae8614d46a8ba43b18bb2c7f46d7fbb

  • SHA256

    dfd104aa405fc9d466c75c97ea643a608b2faabc6a8234417126ca1ab05d0140

  • SHA512

    4cc0742447325f33b35ec61cb572b88ec6eaa35ce2bf36f1fa7f9a69f25da6992c50363169100413e2a72b5289445ddc5628d5abb9f1f6ac077825a275e5622a

  • SSDEEP

    6144:yAY8QgjLbG3BjVEOFOtw5e3mJG8kJeAfMJgwCRM8Xaqegmc8KCx74L:Bs3wy5e3hWJgw8M8X0xc8KykL

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PO ORDER-2311-0145.exe

    • Size

      367KB

    • MD5

      4557b75c3f8dfc2a31ff0e8e56792653

    • SHA1

      d348497a1ae8614d46a8ba43b18bb2c7f46d7fbb

    • SHA256

      dfd104aa405fc9d466c75c97ea643a608b2faabc6a8234417126ca1ab05d0140

    • SHA512

      4cc0742447325f33b35ec61cb572b88ec6eaa35ce2bf36f1fa7f9a69f25da6992c50363169100413e2a72b5289445ddc5628d5abb9f1f6ac077825a275e5622a

    • SSDEEP

      6144:yAY8QgjLbG3BjVEOFOtw5e3mJG8kJeAfMJgwCRM8Xaqegmc8KCx74L:Bs3wy5e3hWJgw8M8X0xc8KykL

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks