General

  • Target

    SecuriteInfo.com.Win32.TrojanX-gen.7663.1355.exe

  • Size

    719KB

  • Sample

    231127-l18rbafg5z

  • MD5

    3bab14b1484b3f93aebdfd5506b3491a

  • SHA1

    a0004f953011ef75c3c6c590b23621718a1513a3

  • SHA256

    9d86e00fef23045dbf976846e845eae2f0470a01171576ba867be71fbd4cb1a3

  • SHA512

    c21636146801c95e9eb4b90e5c261052e6ea666dd0b5ff5891ee88ad084b924cc4a1f981d5b109c81a17a490f1355070bf55b37d1af8cf13431d7356607efbb7

  • SSDEEP

    12288:qti1KYls06LUGr4pETp0WUkuueK8QcsLNSCvAJ/3RTUBEaat0SCsw0hGI195d7B7:qMlnGroumWiIh5A5lUkt0SCsw0hGYfph

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win32.TrojanX-gen.7663.1355.exe

    • Size

      719KB

    • MD5

      3bab14b1484b3f93aebdfd5506b3491a

    • SHA1

      a0004f953011ef75c3c6c590b23621718a1513a3

    • SHA256

      9d86e00fef23045dbf976846e845eae2f0470a01171576ba867be71fbd4cb1a3

    • SHA512

      c21636146801c95e9eb4b90e5c261052e6ea666dd0b5ff5891ee88ad084b924cc4a1f981d5b109c81a17a490f1355070bf55b37d1af8cf13431d7356607efbb7

    • SSDEEP

      12288:qti1KYls06LUGr4pETp0WUkuueK8QcsLNSCvAJ/3RTUBEaat0SCsw0hGI195d7B7:qMlnGroumWiIh5A5lUkt0SCsw0hGYfph

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks