General

  • Target

    Invoice YA 2023.exe

  • Size

    577KB

  • Sample

    231130-hpg8fagg84

  • MD5

    2fdd47b3a729217cdd1848ce1d832bd2

  • SHA1

    80b1f475e7c906927b87b76bea1d72a0ae0ce2c7

  • SHA256

    855f8c478918d0202a467a90a5ead1be7a4e87e08485106a6a545938979204ac

  • SHA512

    1036403542f266d9acc5203889fa55cd95d7a11559ce65baf44bdfc2f447a0575a87399067eafa89c15fe8d93fef52b1e1fb046ec388bfdf66076b6e465587e0

  • SSDEEP

    12288:ANCCCCCCC8CpCPCCsCCOcopox4IpEMEKrMZtn0Mz2YhsDZIwNP:ECCCCCCC8CpCPCCsCCNeiCjP2+sDvNP

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Invoice YA 2023.exe

    • Size

      577KB

    • MD5

      2fdd47b3a729217cdd1848ce1d832bd2

    • SHA1

      80b1f475e7c906927b87b76bea1d72a0ae0ce2c7

    • SHA256

      855f8c478918d0202a467a90a5ead1be7a4e87e08485106a6a545938979204ac

    • SHA512

      1036403542f266d9acc5203889fa55cd95d7a11559ce65baf44bdfc2f447a0575a87399067eafa89c15fe8d93fef52b1e1fb046ec388bfdf66076b6e465587e0

    • SSDEEP

      12288:ANCCCCCCC8CpCPCCsCCOcopox4IpEMEKrMZtn0Mz2YhsDZIwNP:ECCCCCCC8CpCPCCsCCNeiCjP2+sDvNP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks