General

  • Target

    General Attachment.exe

  • Size

    461KB

  • Sample

    231219-skn6asbegj

  • MD5

    103899e1f548e738bb530cb3201cecb9

  • SHA1

    a9068bdcff88484a1c9dcdef0c320032e154810a

  • SHA256

    75b520a76495b24d67cdd55903a423bb130cfc8ecbdc4451e4d7ed79d8739cc8

  • SHA512

    7d6ce52742dbab4efd3ce040a066b92c7b4603956f174b047f461c49adbe29f5a550b416c0dcc86398d876f0168c81b322b577dcf2ed4f608308915d3a76a8f0

  • SSDEEP

    12288:IjgZm1Qud+hkCbkibFWexzNA85cs3Can:2uud+hPHbFJ+2r7n

Malware Config

Targets

    • Target

      General Attachment.exe

    • Size

      461KB

    • MD5

      103899e1f548e738bb530cb3201cecb9

    • SHA1

      a9068bdcff88484a1c9dcdef0c320032e154810a

    • SHA256

      75b520a76495b24d67cdd55903a423bb130cfc8ecbdc4451e4d7ed79d8739cc8

    • SHA512

      7d6ce52742dbab4efd3ce040a066b92c7b4603956f174b047f461c49adbe29f5a550b416c0dcc86398d876f0168c81b322b577dcf2ed4f608308915d3a76a8f0

    • SSDEEP

      12288:IjgZm1Qud+hkCbkibFWexzNA85cs3Can:2uud+hPHbFJ+2r7n

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks