General

  • Target

    2387dfcd993c8035b2f72ad89935d4521b294010115384aaa9cf93813f7ae4ce

  • Size

    385KB

  • Sample

    241106-tqmebssnbz

  • MD5

    07c2f058cd20ca2ea748897dfe3ae4be

  • SHA1

    9eed7f03355832fdf0e121d5528a1217844688a4

  • SHA256

    2387dfcd993c8035b2f72ad89935d4521b294010115384aaa9cf93813f7ae4ce

  • SHA512

    894219e470aafbb5fd7ae9ebc2e77e4793c4fddc48e1266c3d05f73333d58c1965eedb2cff82836974a12ef2c32208c2d741756fb450b6068a45fe72f5ea1ddb

  • SSDEEP

    6144:eVXPgExJ1/tpQDjgJiG7Llz01gnL1ckoBiYUzkiJNzBGKWcjrmZ5:eV/NxfQD5GDAhUkCNzBGKWkrY5

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      2387dfcd993c8035b2f72ad89935d4521b294010115384aaa9cf93813f7ae4ce

    • Size

      385KB

    • MD5

      07c2f058cd20ca2ea748897dfe3ae4be

    • SHA1

      9eed7f03355832fdf0e121d5528a1217844688a4

    • SHA256

      2387dfcd993c8035b2f72ad89935d4521b294010115384aaa9cf93813f7ae4ce

    • SHA512

      894219e470aafbb5fd7ae9ebc2e77e4793c4fddc48e1266c3d05f73333d58c1965eedb2cff82836974a12ef2c32208c2d741756fb450b6068a45fe72f5ea1ddb

    • SSDEEP

      6144:eVXPgExJ1/tpQDjgJiG7Llz01gnL1ckoBiYUzkiJNzBGKWcjrmZ5:eV/NxfQD5GDAhUkCNzBGKWkrY5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks