General

  • Target

    IMG_1507_1603.exe

  • Size

    476KB

  • Sample

    240918-hvcj5syanf

  • MD5

    2a8a0d373755a556111968002bb0ae18

  • SHA1

    f2a651bbc2f162b00c36d6c742afeee573873304

  • SHA256

    1635f4e2f8b923df075800c4654771d8253a3081a7a19788d033b479482e4361

  • SHA512

    f243f2381368c1c296b2f9b0a757c5040bc2fdbfefcc339b45f4a85fb3d7e2da27b3b626825261c1788753e29ca50338a1b97742d2354932c3430a4dfcde1fc8

  • SSDEEP

    6144:hc596EGotRMO7a89EibwB4Cw88YTK7XjHbHI5Cj604zhMhr1:hc596EGmKO7a89Ez4C9DGDb4CB

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      IMG_1507_1603.exe

    • Size

      476KB

    • MD5

      2a8a0d373755a556111968002bb0ae18

    • SHA1

      f2a651bbc2f162b00c36d6c742afeee573873304

    • SHA256

      1635f4e2f8b923df075800c4654771d8253a3081a7a19788d033b479482e4361

    • SHA512

      f243f2381368c1c296b2f9b0a757c5040bc2fdbfefcc339b45f4a85fb3d7e2da27b3b626825261c1788753e29ca50338a1b97742d2354932c3430a4dfcde1fc8

    • SSDEEP

      6144:hc596EGotRMO7a89EibwB4Cw88YTK7XjHbHI5Cj604zhMhr1:hc596EGmKO7a89Ez4C9DGDb4CB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks