General

  • Target

    09d69669bd5a60487351998e19c3153adb8219bd5d9ae6131255251199b2ace0

  • Size

    374KB

  • Sample

    231221-t944gsdfb9

  • MD5

    63eb23665f61d427351570cd21a1358f

  • SHA1

    17c195d0d5bf918997a2a4eb8188c9277c4e1998

  • SHA256

    09d69669bd5a60487351998e19c3153adb8219bd5d9ae6131255251199b2ace0

  • SHA512

    3e517b34207e458a385fb3d9e577406ac5774ae82a077da3ada4706659cd1c32ec7dc5fe76c9377b53002390c0b9407cb10036956771f6ecdb099b234e98b401

  • SSDEEP

    6144:eiyYBXpVvdccrNoguWLgVTb4rDiVAGgnlaTrIDgyE5t+LaLVaFuQS2PJvnU:eij7lcSNoqOb8mBIUyE7+g6PS2RU

Malware Config

Targets

    • Target

      MT Marine Tiger Particulars.exe

    • Size

      515KB

    • MD5

      dfdd7ffec44bc0be0c4d58f33a7428ed

    • SHA1

      a352935a55ea1e1bb3e9853b6971806b1e64bf48

    • SHA256

      f0df0ec243153f35a5522715fb79c372fde175ad98596185ec2eea5a16a535bf

    • SHA512

      4dd5ea906f6113a2aec3f7d03edc45ba86f9b8d9c14b81ef15acca133f8d5d83997904a0733fab522f3ff71cc88c14b647f1e96af86aecddc392a33b6ef9e879

    • SSDEEP

      12288:sXiF3PPBQI0qkGSdbd4dHlCTO3pb2ASwUHqGUS:sm3PPBQIZUdYFCT6dSVrU

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks