General

  • Target

    ce19714fd8b8b9cb4f76411015264d61db6d9ffd534676df96627a3f06f75250.zip

  • Size

    737KB

  • Sample

    231119-zjhepabd63

  • MD5

    b0c7586b0347c73b12f7909ff7c80986

  • SHA1

    fa2ba104870d3d9c1c0deae5b89e0219fc274e85

  • SHA256

    7bd57cf8b25c60ece5adb5d1efea434e13344a678c55a8914e8450c224750c27

  • SHA512

    eef64e3ea740af31dc795af2f3c1323724d32015a66d65b59622fdf91e0a360ad1808b904121c4568d4b561eb4708ae5a3e3eddb872ab595e266f8b34a73383b

  • SSDEEP

    12288:cuK+oRsjLHYolJ/1RBviYtzmVu60DxLPtb4BjaV7SjpyptNx/OD1resWbr7jgp:c1NRyL3HRtiYtzmoF3Gu1+p+L/GKnX0p

Malware Config

Targets

    • Target

      ce19714fd8b8b9cb4f76411015264d61db6d9ffd534676df96627a3f06f75250.exe

    • Size

      834KB

    • MD5

      cd3b89d70c6c3e69ef61043203971251

    • SHA1

      808c5dfe3332beef56946e71c12e9aef8b261fd9

    • SHA256

      ce19714fd8b8b9cb4f76411015264d61db6d9ffd534676df96627a3f06f75250

    • SHA512

      ca937b0d62dc792f00b35b2ce63f3cd81fbef93cb331b803f88f8de2c96eb6e763fd5371ab01042d12265a53a460c5e646a698afe2ff22267e56fef3b9b8d3e4

    • SSDEEP

      12288:nWuNuRe74QslMSwe5z/zAKkfGvu4TmCx21vqbBtM9ij23DFgx:NkISMM5b0KmE21vqbtj23DFgx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks