General

  • Target

    24092024_1251_23092024_Inquiry.7z

  • Size

    604KB

  • Sample

    240924-p3y7fayfna

  • MD5

    0eaf6eaefc9937ec2b40b42ee53560d3

  • SHA1

    50e8fb6a012f3b7ee6fadb5711f858a0bc176c07

  • SHA256

    9f765556ec035b53f7b494b71cd6f77fa8f3309d47b51add2efb1af930e1b0b3

  • SHA512

    7365ec7233b3826efc49517c1e14619e613b78a4ec1b7cab67bebb628f30dc7c447282a65932164e9bca3f7135aed8dc1dc751906a147bc779a920e7842a8f4d

  • SSDEEP

    12288:9+6Us22R24Q4HNJiCyG5fderC0b79uGMA9e+SoCooXT/+ySU:9SR0W4tJiCI9uQe74oXTH/

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Inquiry.exe

    • Size

      956KB

    • MD5

      6f6fc0f420a60c751458c162a0c2afb8

    • SHA1

      794bdb4058e2e3e6447fec6094c7de7a0403317d

    • SHA256

      67a5d724397d8d7667689aa4348f5b19858021c44ca63a3a8cd17c02039011da

    • SHA512

      5613842a0333322494a3076001e52f8270d5085155e4c8aafd36c70e52c7cf8573e6d1ce11079670468f86716b75faa1bcf6c265bbd3b08fbb0f04d3c92340cb

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCzZ/6tUuhbTKpuh/:7JZoQrbTFZY1iaCF6tUST5h/

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks