General

  • Target

    SecuriteInfo.com.Win32.CrypterX-gen.28912.11851.exe

  • Size

    432KB

  • Sample

    231226-sma2fsdbc6

  • MD5

    dc25c89ed10e75bc8f43dfce1287e307

  • SHA1

    fe75ea5295c2a4711b5296d0e23b3542cdc9a7c4

  • SHA256

    7eebc8928fee351d731226a9abbf7ce6e5833072b18721c603573fc8ff4c6e16

  • SHA512

    a48340458dc9c607a16d99f233a1025f290bf2584b4ff594203a84b68ed7f6e44a7f8fc82988df3002963481a29506946f3b45c49b7fe572b693404fbdd88d36

  • SSDEEP

    12288:E2t+axyVJLDNnZa693JxwTIAqf2HQGHwT5NI:vwVJLDNno695x+I329z

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win32.CrypterX-gen.28912.11851.exe

    • Size

      432KB

    • MD5

      dc25c89ed10e75bc8f43dfce1287e307

    • SHA1

      fe75ea5295c2a4711b5296d0e23b3542cdc9a7c4

    • SHA256

      7eebc8928fee351d731226a9abbf7ce6e5833072b18721c603573fc8ff4c6e16

    • SHA512

      a48340458dc9c607a16d99f233a1025f290bf2584b4ff594203a84b68ed7f6e44a7f8fc82988df3002963481a29506946f3b45c49b7fe572b693404fbdd88d36

    • SSDEEP

      12288:E2t+axyVJLDNnZa693JxwTIAqf2HQGHwT5NI:vwVJLDNno695x+I329z

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks