General

  • Target

    PO 965362756.exe

  • Size

    578KB

  • Sample

    231130-hq3krsha4t

  • MD5

    ef0dbd849a17963eeedf4ff16d796f8e

  • SHA1

    04708245d95f780a6d86c732c22dd5ebb64a258f

  • SHA256

    fcff4f7f64b5242e1df739d339166fe76a88245e3de1ac1a49e5f1649d6dd4ba

  • SHA512

    aefc3efee16c8783819a2d16e64b2b4313ee90fce9083af1562a8df6b8fcf9b03289824ca8732cc1ca8e5c1a500ab94498efbba000d3d000b2f68cb55eb3723f

  • SSDEEP

    12288:wvcopox4onaEbl8ZSJfhjPysixic0BlK6L0oYkGMnXJeAFBT:Je5ZOfh2ZcBlKf4G+JeA

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PO 965362756.exe

    • Size

      578KB

    • MD5

      ef0dbd849a17963eeedf4ff16d796f8e

    • SHA1

      04708245d95f780a6d86c732c22dd5ebb64a258f

    • SHA256

      fcff4f7f64b5242e1df739d339166fe76a88245e3de1ac1a49e5f1649d6dd4ba

    • SHA512

      aefc3efee16c8783819a2d16e64b2b4313ee90fce9083af1562a8df6b8fcf9b03289824ca8732cc1ca8e5c1a500ab94498efbba000d3d000b2f68cb55eb3723f

    • SSDEEP

      12288:wvcopox4onaEbl8ZSJfhjPysixic0BlK6L0oYkGMnXJeAFBT:Je5ZOfh2ZcBlKf4G+JeA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks