General

  • Target

    6a245b905c19e22d85a06530f05c0cc369479df8f258f095450d75e4510ef612

  • Size

    598KB

  • Sample

    240926-p8t5nsyblm

  • MD5

    0d7da8c55e2245f1484908be0381ce5a

  • SHA1

    d2eb542b4b644dc264f866f9c3794663d64da99d

  • SHA256

    6a245b905c19e22d85a06530f05c0cc369479df8f258f095450d75e4510ef612

  • SHA512

    66ea9a979ab7a966ef047f55b43e9fe14c6cc2f284b916cfac9c587b8728a07bd815b8fddacc04726e1f3ee4143f0f98d559ee22cfdb2767adb2e7f0864a02ee

  • SSDEEP

    12288:YHWZ2ysM9RZ1/uXIp3727sbuCqve55x08YtU9FUdv5ZTOBEM:Y2ZIMzZ9uY50sbLqUzae9FUdvLI

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SPARE PARTS 3726 lbs1691 Kgs.exe

    • Size

      950KB

    • MD5

      33f4f9f62704cd365522a3b9554c3feb

    • SHA1

      015363f84320d84a4047390ddc25657815326c1f

    • SHA256

      6f6a020c25a3ecfe475e9b86cc1aaed8092b6d23a4886d36944af7c622914f37

    • SHA512

      c739dc900fdb65f1bbecab17642382d58679a7ae36ca5cc4fbbbdd3a2e4563ed452633b6aad6585f666bf56f279e4da0703ec8b05093378756e6665965e30931

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCPPGBl2GqanwPnG0xHt:7JZoQrbTFZY1iaCPPc2GFnC

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks