General

  • Target

    b648a4b84b3e48bb3a7f08dcd7a81a2a.arj

  • Size

    640KB

  • Sample

    240918-x1wyasydpc

  • MD5

    b8a367e421210b9dca806bdc10c3a215

  • SHA1

    54e7432c0f2ff07a96c74f0acb4172811de463dd

  • SHA256

    ade287056a35378aa396ca400b0a39e2566d566612313a33edf89731ecce8bf5

  • SHA512

    1aed527abc6cb3606fb77914a0bcf5225ee726f794479d7ee52f248b8c0c845bf1a8f89289946d84a0677309d6716a5ecb4cabf5b08b7660fde80f3b173a9fef

  • SSDEEP

    12288:DCLWkiNtbsCCje39cdViQAIKVsMSi6fjUlwEVHphcnOkM:mkNaCC/7HIsh1f4+EZP9

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Payment Slip_Pdf.exe

    • Size

      1.0MB

    • MD5

      cbc85c6e67d54fbd245e715137333f99

    • SHA1

      92225d2d10b0894eb9aea75ad9e5d6a230c5d290

    • SHA256

      5911349922ae05bdb94047a5ac5c6070b79583380a277e88ecf9d74ba7a0d851

    • SHA512

      fe09671717697c95ea45ab4c08e76e33d6709d59fa217301c4fe0ba097aa71a4f13386e6d8eb0494ed91f87fd1b24da402c89e1d9ebc8618286914f887944427

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaajV1YVEpIxurZh/L0:mJZoQrbTFZY1iaiXYqpxVhw

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks