General

  • Target

    c4acb39fb93d5956f061a9ab463a596a28e5f9d3a6a62e43f1cbf7de55835d4f

  • Size

    498KB

  • Sample

    231206-f2bv3sbf42

  • MD5

    c732fdb0eab89de4a31e862346c9ec13

  • SHA1

    2b1a2f96efe846ed223fac451855e6b253f4b454

  • SHA256

    c4acb39fb93d5956f061a9ab463a596a28e5f9d3a6a62e43f1cbf7de55835d4f

  • SHA512

    82952d20572b46fecb1022afc838237db52e579546409e591b697414584f264b11f8a2643fd5a2ebc8bfb5143bc44d3c6e320a7efcae6cc4689c3c12cbfa4f4f

  • SSDEEP

    12288:351EVrfyOYFNs3QkbAoxi6Kb5VRPDu1qjGLej2I:pWmOYNsbAoMryYtjX

Malware Config

Targets

    • Target

      PO2012066373 -23-pages-2-3.exe

    • Size

      530KB

    • MD5

      1e9bd17b41b3d22d9f1d0ede3af18439

    • SHA1

      37cbc2fc2bb09be167af47fd22a5f51d1be73383

    • SHA256

      9a14222cf7f17d59fc5c4a1eff5fbfd662bf4d42c6355258d10e25c8f4ff8f2f

    • SHA512

      06905c18205bdfa87eb73fe050177e915502295952fd70f73edb5b258842c953b41afc18187a2370a0bd92561438dbccc74655b595e38ba3c34add9bcf462764

    • SSDEEP

      12288:KmPQaueH5qMz95lgBCDAjAFLExSdyw3xodJMqFVVU7kFtSCsqhKpkKlxdVx2:KmNqMz95OcDqAaEcFVMuACFirdVx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks