General

  • Target

    df76f7f2ca01712b93706eed209a53dfbcddb3ee9e202efbb1cb27d09a99abe4

  • Size

    602KB

  • Sample

    241010-gbz1navall

  • MD5

    4026787e21bf3a6117f1c642e53e5396

  • SHA1

    36ce8af19fb4d389b76fa086e7e5812ab1af91cd

  • SHA256

    df76f7f2ca01712b93706eed209a53dfbcddb3ee9e202efbb1cb27d09a99abe4

  • SHA512

    8a93546a8dc78cbad288b73c7de7f21aa2073a23b099f38a2ff9db7f901c21f3128af6b39db788c4536d78e6f63acfccd2a0d37f1c8a45a69654e1429c4b5bac

  • SSDEEP

    12288:KbV3V2BMC4QKNjDm+ZdWMPygcPIXPktJ4acznbup46w:kJV5CtyDjbyFQzn96w

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SEPTEMBER SOA 2024.exe

    • Size

      997KB

    • MD5

      ba6582876c5e9697840b20325ff120d0

    • SHA1

      f5a9ce06138224b27b9eb13bc258859acb177b99

    • SHA256

      611a15d01208ad0010452147c4e153b89299e83450329fd2918ae88838fa6df5

    • SHA512

      fcafcb8c95414a41f5b3f0e7c80cd326e3ef84147af1adf7965a3f3fa236163e802c85508e0afcbf103777f7a9d3309d29928d8adc3ac5ca43e5bca39d81c59b

    • SSDEEP

      12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5QYEAmD4oESIFTYrgxtATG/PnaFLIont4:WfmMv6Ckr7Mny5QYjBcrbG/PFZUcW6L

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks