General

  • Target

    inquiry#80163.exe

  • Size

    82KB

  • Sample

    240909-s8rlbsydjf

  • MD5

    4b91b8ed6ff289482b77a741afe00341

  • SHA1

    37c2e4b4879e0c16e31272b1248bc281f36a1229

  • SHA256

    c63fd4f25b1d6ab7fc80895ffed1f495e11eb31cc50d909cb977330ca31ab579

  • SHA512

    b6a22c0a981a65a0ee736a7f45ec6f9bbf156e8c0ed78da63067b172a59303fdb6bea3a893d50a8264bc52e0c12c12109227a7f2ca485fc38239019a1ecaa463

  • SSDEEP

    768:O4zOxVLVO49eYJBvmCcQw55EpYinAMxEP:hUf9JBvmnQ2C7HxE

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      inquiry#80163.exe

    • Size

      82KB

    • MD5

      4b91b8ed6ff289482b77a741afe00341

    • SHA1

      37c2e4b4879e0c16e31272b1248bc281f36a1229

    • SHA256

      c63fd4f25b1d6ab7fc80895ffed1f495e11eb31cc50d909cb977330ca31ab579

    • SHA512

      b6a22c0a981a65a0ee736a7f45ec6f9bbf156e8c0ed78da63067b172a59303fdb6bea3a893d50a8264bc52e0c12c12109227a7f2ca485fc38239019a1ecaa463

    • SSDEEP

      768:O4zOxVLVO49eYJBvmCcQw55EpYinAMxEP:hUf9JBvmnQ2C7HxE

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks