General

  • Target

    OF 23204368.exe

  • Size

    522KB

  • Sample

    231128-hlx5gsfg85

  • MD5

    4b6e125ddba8c07cc0ebe826ff6d1a26

  • SHA1

    05e2921e7acc85b0c4db492250ab158bc3ccd1da

  • SHA256

    3f0862dc7485fc5c5d3eab573dd2dfedad47241d7dbaf7c8cfd218ff105a0ace

  • SHA512

    6279ed60092a0625d9ab483f771fbe1ff5c9631a22ae5870062ee159474a2d5b317cd9eb8b6ec0b4a911ce0516caaa1965f981dc1f9536602e2e36bfb58181f2

  • SSDEEP

    12288:6HM4lrrAUCfyg7h6GxDmf16BuTtzpHaOfJU8MN7YRy:6HM4lXAUCKg7h6GxDVBuxF6eJUPaR

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      OF 23204368.exe

    • Size

      522KB

    • MD5

      4b6e125ddba8c07cc0ebe826ff6d1a26

    • SHA1

      05e2921e7acc85b0c4db492250ab158bc3ccd1da

    • SHA256

      3f0862dc7485fc5c5d3eab573dd2dfedad47241d7dbaf7c8cfd218ff105a0ace

    • SHA512

      6279ed60092a0625d9ab483f771fbe1ff5c9631a22ae5870062ee159474a2d5b317cd9eb8b6ec0b4a911ce0516caaa1965f981dc1f9536602e2e36bfb58181f2

    • SSDEEP

      12288:6HM4lrrAUCfyg7h6GxDmf16BuTtzpHaOfJU8MN7YRy:6HM4lXAUCKg7h6GxDVBuxF6eJUPaR

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks