General

  • Target

    103899e1f548e738bb530cb3201cecb9.bin

  • Size

    345KB

  • Sample

    231221-bg4yxafabm

  • MD5

    1845d4fee49c354c97b0515bad555153

  • SHA1

    5d6899f743d0689742a592f90b11eb48b2be6c4f

  • SHA256

    ae7edbed646e6f3603ac4c22e75a971e2cea9b2c9e6edee7edf59f38f1498de2

  • SHA512

    37a4c54b7107636e6acc68758f3af0077f506652c1d44080c0c1ba882fe4ab93aca6cf9e4e8f85283687769053bded653c3bdf7ea82265cc01192c430b413282

  • SSDEEP

    6144:8qz5xRZzIaBlIOzQDEEUACzfY27/c86T2AgPLTpZZwdKRsswgVfn:8qzJZzzBlxsTUpDFk86T2AMHpZZwERWc

Malware Config

Targets

    • Target

      75b520a76495b24d67cdd55903a423bb130cfc8ecbdc4451e4d7ed79d8739cc8.exe

    • Size

      461KB

    • MD5

      103899e1f548e738bb530cb3201cecb9

    • SHA1

      a9068bdcff88484a1c9dcdef0c320032e154810a

    • SHA256

      75b520a76495b24d67cdd55903a423bb130cfc8ecbdc4451e4d7ed79d8739cc8

    • SHA512

      7d6ce52742dbab4efd3ce040a066b92c7b4603956f174b047f461c49adbe29f5a550b416c0dcc86398d876f0168c81b322b577dcf2ed4f608308915d3a76a8f0

    • SSDEEP

      12288:IjgZm1Qud+hkCbkibFWexzNA85cs3Can:2uud+hPHbFJ+2r7n

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks