General

  • Target

    e-dekont.exe

  • Size

    867KB

  • Sample

    231128-jx9s4agd71

  • MD5

    351185ac78bdc35a9413a371ce0720f8

  • SHA1

    1dff5196f932173b34de11f20d1a4565443b27cf

  • SHA256

    998b1bdaa4209009a978ecc2c8e82a7264a2a40d6f8f9499e97768a5b72e1329

  • SHA512

    7b09b7e9d80782c835db183cf3c74da9a965806172e3cfcc8c657bfa06e3d9f766a5c30b8a9c69d1170710c512f9e0ac240b2f20ff88de00d109fcec0f1144ae

  • SSDEEP

    12288:Qyj7+nyHXdxyRqWDEcKczgNOQ1ogZL2DJkXQmbCpW:Qyjqy3d2fD2cMOgZLK

Malware Config

Targets

    • Target

      e-dekont.exe

    • Size

      867KB

    • MD5

      351185ac78bdc35a9413a371ce0720f8

    • SHA1

      1dff5196f932173b34de11f20d1a4565443b27cf

    • SHA256

      998b1bdaa4209009a978ecc2c8e82a7264a2a40d6f8f9499e97768a5b72e1329

    • SHA512

      7b09b7e9d80782c835db183cf3c74da9a965806172e3cfcc8c657bfa06e3d9f766a5c30b8a9c69d1170710c512f9e0ac240b2f20ff88de00d109fcec0f1144ae

    • SSDEEP

      12288:Qyj7+nyHXdxyRqWDEcKczgNOQ1ogZL2DJkXQmbCpW:Qyjqy3d2fD2cMOgZLK

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks