General

  • Target

    3c6ab74c9de7c47f9376589eeb4806c3a1fbc24591833f7b008284c8afe5078f.exe

  • Size

    492KB

  • Sample

    231127-vf1pmsac47

  • MD5

    d6373bb449c618767f149376007d8531

  • SHA1

    398289daac94086f60320644ba3f8ef8b4fb04ac

  • SHA256

    3c6ab74c9de7c47f9376589eeb4806c3a1fbc24591833f7b008284c8afe5078f

  • SHA512

    89a1eac9995d0d16071164db1f477df5f5a4e6db8f874a747ca310094f1974cff77db7ce1fcbd8b23617803032d32b92220d35c540fac5f3568a3e5115cac559

  • SSDEEP

    12288:FN8oX0F3P1NMLwlfVgZ/mDnIroFUETfRWoJCWv:cQ03NJfVgOIroG0RdJdv

Malware Config

Targets

    • Target

      3c6ab74c9de7c47f9376589eeb4806c3a1fbc24591833f7b008284c8afe5078f.exe

    • Size

      492KB

    • MD5

      d6373bb449c618767f149376007d8531

    • SHA1

      398289daac94086f60320644ba3f8ef8b4fb04ac

    • SHA256

      3c6ab74c9de7c47f9376589eeb4806c3a1fbc24591833f7b008284c8afe5078f

    • SHA512

      89a1eac9995d0d16071164db1f477df5f5a4e6db8f874a747ca310094f1974cff77db7ce1fcbd8b23617803032d32b92220d35c540fac5f3568a3e5115cac559

    • SSDEEP

      12288:FN8oX0F3P1NMLwlfVgZ/mDnIroFUETfRWoJCWv:cQ03NJfVgOIroG0RdJdv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks