General

  • Target

    Max.exe

  • Size

    772KB

  • Sample

    231225-rxzxwsafar

  • MD5

    770f963943fae86ad2fb95533defae2d

  • SHA1

    efadeaa28fe3c30e1224d41836b40666f9f5cd38

  • SHA256

    fd3215fd4bcb33f2149cd4bed63011c2b992b5a008cdd289559031741e8a3089

  • SHA512

    ae6480f80555dd6ed6dd8780d9faf4b0b3ba21a8b3f0ff50c73a5d38fa930ddc34e09ee0aaeb208c08d334b7404ab854478e1a39f929a496835e21de50a052c5

  • SSDEEP

    12288:ZJpHCmbiNIwP7BpD1tM2MH6YZLuKw3WDJV733EgpAbSVv8Ipch:VCFPNpD1tM2MTZLEwV

Malware Config

Targets

    • Target

      Max.exe

    • Size

      772KB

    • MD5

      770f963943fae86ad2fb95533defae2d

    • SHA1

      efadeaa28fe3c30e1224d41836b40666f9f5cd38

    • SHA256

      fd3215fd4bcb33f2149cd4bed63011c2b992b5a008cdd289559031741e8a3089

    • SHA512

      ae6480f80555dd6ed6dd8780d9faf4b0b3ba21a8b3f0ff50c73a5d38fa930ddc34e09ee0aaeb208c08d334b7404ab854478e1a39f929a496835e21de50a052c5

    • SSDEEP

      12288:ZJpHCmbiNIwP7BpD1tM2MH6YZLuKw3WDJV733EgpAbSVv8Ipch:VCFPNpD1tM2MTZLEwV

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks