General

  • Target

    c8361efdf2c26f872b481fc64b7a24cc9a203952916a75d5dafb34b4b4445377

  • Size

    591KB

  • Sample

    241004-pcfbmsxdna

  • MD5

    78add14da172a1478a2837558ee0077c

  • SHA1

    c15ce10eafd3912ff09b7075fa6b54e8a1075a18

  • SHA256

    c8361efdf2c26f872b481fc64b7a24cc9a203952916a75d5dafb34b4b4445377

  • SHA512

    eddab30e0a8a9b8c92c44b20d6101bc1f8b8436fbbd67dfaa06cdf7dc87093f52cbf2f9f0588f9eb79d460a2999ffecf37e50cd41123f8683676e9910c71650c

  • SSDEEP

    12288:ChiRSO9tYT0sLt5Nv1t7SoxnlKQtpLS4A6UnVyZgdNsNcamM:7BtI0Mh1h5xIWpLW6UVt2NcamM

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Soa.exe

    • Size

      940KB

    • MD5

      32c473da08e7d07464f3632f81792436

    • SHA1

      690988213510ae6cb1b03306c51e408670e8c4c4

    • SHA256

      7c8fefbe9b0778ca074d9c110d8c9bd875bdb08eb9fdc697c395cf6aea5581c4

    • SHA512

      acf354ec39a72d5142a668cfc451e2fc80668a6193d324991b90fe811cee19f7a8bad015fa9a99ce708d2d402810660e6d5759b3bc2d74f44379c86f832ed310

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLcFv7lpvrt6FNJiMSn:f3v+7/5QLKvppvJ2M/n

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks