General

  • Target

    10092024171909092024PayrollListDoc.rar

  • Size

    20KB

  • Sample

    240910-xgr51ayhjk

  • MD5

    0987ba5afbd453765939a96df2011f39

  • SHA1

    4093495f387a3d6486c9c51ce4fe06cd75a0c007

  • SHA256

    5e22e8ff03805bed3d12c363d281f306ed0e4902d8a6fc1770c9fda85af8cd14

  • SHA512

    417722d33866d0973043d8a96d9b1aaf4923ea6cb188b207cc7bc8db2b18b7e3221c8a5d0b5e1bc2968b62e3fe052b04fceacac185a58cb87ba920168ded35c9

  • SSDEEP

    384:YOFK452r+T5p97mYCdI816LRb55NUaBEKFsCEfjNbnDISIs6/RKFeqDH+l+5:Yw352ypBmYxt9K3KyCEfhbkS6/clQm

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      inquiry#1523.exe

    • Size

      82KB

    • MD5

      af2b325becf3f12462529b961699557a

    • SHA1

      88da506a656c9ba9615e4134234084bd5c6c086f

    • SHA256

      365b8dab76c07e3c7ea3cd4a9d683265db5210b6b9a30e9dc520f358b829d30d

    • SHA512

      114e5bae2cf466ae6d7ace9728cac19e738dd5aa532df07b082d42fab22b7a2f286a606a6c476d4cbbea6c8f14804e300ca0e76d634e75ba22c0a8fecc6dad96

    • SSDEEP

      768:v632KhVO49eYJBvmCcQw5cEpYinAMxEP:ymKP9JBvmnQG17HxE

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks