General

  • Target

    MT ESHIPS COBIA.exe

  • Size

    492KB

  • Sample

    240108-wp6spaffc3

  • MD5

    eed3180705c584f83fce43b5a89a4d95

  • SHA1

    7b49f051d5bab815ee88748368fb06ad07ba70a7

  • SHA256

    d85b912c5171741966d6c8238db04de39b56ed1b696ccf7a32400d34cd29338c

  • SHA512

    3b35e07a6d117700725d1569079eb44dc1fb98189d2fae55b2d9797a29365ef36fe794184561eb429fd0737fabbc2e8a282430a22725558ec7424cbfe06e878e

  • SSDEEP

    12288:l/ipq9IbMmP2qXTeyOnTYBbsAOvrYfQ6:l/BgMm+qDebGZouQ6

Malware Config

Targets

    • Target

      MT ESHIPS COBIA.exe

    • Size

      492KB

    • MD5

      eed3180705c584f83fce43b5a89a4d95

    • SHA1

      7b49f051d5bab815ee88748368fb06ad07ba70a7

    • SHA256

      d85b912c5171741966d6c8238db04de39b56ed1b696ccf7a32400d34cd29338c

    • SHA512

      3b35e07a6d117700725d1569079eb44dc1fb98189d2fae55b2d9797a29365ef36fe794184561eb429fd0737fabbc2e8a282430a22725558ec7424cbfe06e878e

    • SSDEEP

      12288:l/ipq9IbMmP2qXTeyOnTYBbsAOvrYfQ6:l/BgMm+qDebGZouQ6

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.