General

  • Target

    db606e13-f9f7-41f0-0f08-08dcd6ba77fc.arj

  • Size

    643KB

  • Sample

    240918-jnbjyazdpf

  • MD5

    6e4ae34c73751b343355ae342864c4da

  • SHA1

    5a4a781062e16fffaad56abb6ec58d06cd7cce9a

  • SHA256

    33631395a384f6e9324a449e1a128273258f3dcc7702399b4e1c3614e2e53ac5

  • SHA512

    4bc803f83a5d7a5482684b7019c5ca85d045f2327f26e8339dddd03358c4871d11e0decb0890b9f728ee369b0456aec78594b85b440d6a894d28f8bf221f5c7f

  • SSDEEP

    12288:DCLWkiNtbsCCje39cdViQAICUTKSTeT/pgRIgqMTB775ZRnskPcvjk9mcCZqyY:mkNaCC/7HNjBp75vZcVrY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Shipping Documents_Pdf.exe

    • Size

      1.0MB

    • MD5

      555219b2b681da0f48f4c2394ee04855

    • SHA1

      96f59a675baeb6f6a363920abff8906cb17350d4

    • SHA256

      69b55bbf73f29774d66ed8da3c99673da991632f347fd99b2a200aee80aebf7b

    • SHA512

      81938c46020ab3f906809f7eadd321eabc177248c8064ee35fca69ce868017af0d44091cabe687f17961fdedf0fec36e39cecf6dbc2d9d33ba2e52529656bf32

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaajkdBz28cdmUu/Zj6l/NYG:mJZoQrbTFZY1iaikGMbj6l/qG

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks