General

  • Target

    PriceList3428865.exe

  • Size

    587KB

  • Sample

    231205-t9sepada28

  • MD5

    41cbfe9a9cbbbbf6f986bfb6e360e119

  • SHA1

    a7715d74a5bc11dd4f75d96e206ec7f38b43fb76

  • SHA256

    c3c328f277cdb667eda6592126db6e7290f46ae37fc5f84d836e42e325612ab3

  • SHA512

    88aff934e95f7f178c0275370ea5d96b33ae6fc6041ed428c7c10d247f36f28afe7cddff4cb5dba0d910542cec9e5bd39ee1eca1edccf1d59c0d5e74b77ade04

  • SSDEEP

    12288:3l5nF80Vdqrlbrr48/HfOPYVTJJkXa0Me6r7jBLdMiVxr:3lVqhbrrXHfsQkK0t8pLdMibr

Malware Config

Targets

    • Target

      PriceList3428865.exe

    • Size

      587KB

    • MD5

      41cbfe9a9cbbbbf6f986bfb6e360e119

    • SHA1

      a7715d74a5bc11dd4f75d96e206ec7f38b43fb76

    • SHA256

      c3c328f277cdb667eda6592126db6e7290f46ae37fc5f84d836e42e325612ab3

    • SHA512

      88aff934e95f7f178c0275370ea5d96b33ae6fc6041ed428c7c10d247f36f28afe7cddff4cb5dba0d910542cec9e5bd39ee1eca1edccf1d59c0d5e74b77ade04

    • SSDEEP

      12288:3l5nF80Vdqrlbrr48/HfOPYVTJJkXa0Me6r7jBLdMiVxr:3lVqhbrrXHfsQkK0t8pLdMibr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks