General

  • Target

    d6373bb449c618767f149376007d8531.bin

  • Size

    467KB

  • Sample

    231128-dvxsvseh9y

  • MD5

    7a121ea012c34d316c0576ec1210d28c

  • SHA1

    97ef3de96ac0a5852e0d793aa71bc217a14c1545

  • SHA256

    3a1de3792ed3d4cd73052c938f0850610a5d501e4f47f4ef3ed5e099dec0a25a

  • SHA512

    da8912f9d5490670261dda370472cec223eec78410b8d0ac8c243994a61f989e194a0cf535077f611a72feaf1deeba0a5704e6135a754062bf0d097cb4372a77

  • SSDEEP

    12288:xyFsh72G5inW8t35HwAMh5IFF7HC4XDkrMIpgZUYNUlmpgBu:UFOCGAnZt5QAMh5IDH/8MIpUvUlQg8

Malware Config

Targets

    • Target

      3c6ab74c9de7c47f9376589eeb4806c3a1fbc24591833f7b008284c8afe5078f.exe

    • Size

      492KB

    • MD5

      d6373bb449c618767f149376007d8531

    • SHA1

      398289daac94086f60320644ba3f8ef8b4fb04ac

    • SHA256

      3c6ab74c9de7c47f9376589eeb4806c3a1fbc24591833f7b008284c8afe5078f

    • SHA512

      89a1eac9995d0d16071164db1f477df5f5a4e6db8f874a747ca310094f1974cff77db7ce1fcbd8b23617803032d32b92220d35c540fac5f3568a3e5115cac559

    • SSDEEP

      12288:FN8oX0F3P1NMLwlfVgZ/mDnIroFUETfRWoJCWv:cQ03NJfVgOIroG0RdJdv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks