General

  • Target

    14d85ed5d393839b550f5a8c2fd37a1a3ddb70e802b77f7b433f3c2ff34c635dexe.exe

  • Size

    532KB

  • Sample

    231129-vb7mdsac5x

  • MD5

    3c55772d1d2d8e233a8134fdafaa172d

  • SHA1

    d64bef49731e6048fbd78451e4ec2ee7d425143a

  • SHA256

    14d85ed5d393839b550f5a8c2fd37a1a3ddb70e802b77f7b433f3c2ff34c635d

  • SHA512

    ab946c3994d74d92765d1ca7fc02c9b4a808801b52435482e2b815e6adf6c37f787659b12cbbf43d2e5d8121caa2b1bcc63cd0999f3f7f968a15e748fdff028c

  • SSDEEP

    12288:hiZCQmbCpQN8oOVTBqmC/tttm2hH2UJS77GMM6m1jSsGI:M4N8R5Bu/tfLhH2UAHtDsG

Malware Config

Targets

    • Target

      14d85ed5d393839b550f5a8c2fd37a1a3ddb70e802b77f7b433f3c2ff34c635dexe.exe

    • Size

      532KB

    • MD5

      3c55772d1d2d8e233a8134fdafaa172d

    • SHA1

      d64bef49731e6048fbd78451e4ec2ee7d425143a

    • SHA256

      14d85ed5d393839b550f5a8c2fd37a1a3ddb70e802b77f7b433f3c2ff34c635d

    • SHA512

      ab946c3994d74d92765d1ca7fc02c9b4a808801b52435482e2b815e6adf6c37f787659b12cbbf43d2e5d8121caa2b1bcc63cd0999f3f7f968a15e748fdff028c

    • SSDEEP

      12288:hiZCQmbCpQN8oOVTBqmC/tttm2hH2UJS77GMM6m1jSsGI:M4N8R5Bu/tfLhH2UAHtDsG

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks