General

  • Target

    Signed PO.exe

  • Size

    530KB

  • Sample

    231206-ttm52aed2w

  • MD5

    1e9bd17b41b3d22d9f1d0ede3af18439

  • SHA1

    37cbc2fc2bb09be167af47fd22a5f51d1be73383

  • SHA256

    9a14222cf7f17d59fc5c4a1eff5fbfd662bf4d42c6355258d10e25c8f4ff8f2f

  • SHA512

    06905c18205bdfa87eb73fe050177e915502295952fd70f73edb5b258842c953b41afc18187a2370a0bd92561438dbccc74655b595e38ba3c34add9bcf462764

  • SSDEEP

    12288:KmPQaueH5qMz95lgBCDAjAFLExSdyw3xodJMqFVVU7kFtSCsqhKpkKlxdVx2:KmNqMz95OcDqAaEcFVMuACFirdVx

Malware Config

Targets

    • Target

      Signed PO.exe

    • Size

      530KB

    • MD5

      1e9bd17b41b3d22d9f1d0ede3af18439

    • SHA1

      37cbc2fc2bb09be167af47fd22a5f51d1be73383

    • SHA256

      9a14222cf7f17d59fc5c4a1eff5fbfd662bf4d42c6355258d10e25c8f4ff8f2f

    • SHA512

      06905c18205bdfa87eb73fe050177e915502295952fd70f73edb5b258842c953b41afc18187a2370a0bd92561438dbccc74655b595e38ba3c34add9bcf462764

    • SSDEEP

      12288:KmPQaueH5qMz95lgBCDAjAFLExSdyw3xodJMqFVVU7kFtSCsqhKpkKlxdVx2:KmNqMz95OcDqAaEcFVMuACFirdVx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks