General

  • Target

    Ship Particulars.exe

  • Size

    510KB

  • Sample

    240305-hrg1fshb8s

  • MD5

    6debaa51d662e09d78813d4b6c6bb8ca

  • SHA1

    323956d6dbf48dec9006960f8f700fe388d059e0

  • SHA256

    51f20a43fbc4b4583e43fc6f60200093897653f43e16737ea1ddee9e6ddbc370

  • SHA512

    2d10d8016f93e0571f6b0a5e4e1b51d85d47b58fb0f3acf256f86eece9ef4a9276a7f7959b123cea15fb1974bc48684c1e67f13a65cd2b01dc0f75e6f15e247b

  • SSDEEP

    12288:dYVofpHdcC/KHY3b3m+6p+ydJKnjI42LGUVNLT:2apC6K43b3j8HIy1rLT

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Ship Particulars.exe

    • Size

      510KB

    • MD5

      6debaa51d662e09d78813d4b6c6bb8ca

    • SHA1

      323956d6dbf48dec9006960f8f700fe388d059e0

    • SHA256

      51f20a43fbc4b4583e43fc6f60200093897653f43e16737ea1ddee9e6ddbc370

    • SHA512

      2d10d8016f93e0571f6b0a5e4e1b51d85d47b58fb0f3acf256f86eece9ef4a9276a7f7959b123cea15fb1974bc48684c1e67f13a65cd2b01dc0f75e6f15e247b

    • SSDEEP

      12288:dYVofpHdcC/KHY3b3m+6p+ydJKnjI42LGUVNLT:2apC6K43b3j8HIy1rLT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks