General

  • Target

    FACTURA_240001920.zip

  • Size

    519KB

  • Sample

    241115-kwmgva1ldt

  • MD5

    f1fc58a97fc3f2502b7cdd0d046ecf81

  • SHA1

    02c028d780a63ccdd20b68cef08b6fa045cda1e3

  • SHA256

    ca5a0e2963dc959524712f6d71b937d20a2bf15a4fece708ede9a84b50bb2ebf

  • SHA512

    cd5ac2f3c35672aacd2916b2619099b32977c51263791c8e36f120ab69f3d9f4d79ba042377b046fc0e6466c48d29fd809566360086f8585cc726f1b4f40948d

  • SSDEEP

    12288:ATnVHUif59VXBKLDCyNJV3g3p5EpwdOyPC:AFP5rBKHy51x6

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      document.exe

    • Size

      548KB

    • MD5

      682e0e22ac2f06d26d24cac1769e1b80

    • SHA1

      1302dd34b80e32415baacafecdfe31d61d0dd563

    • SHA256

      51d366ab87eb5988f96d068d503d21b801b5df4535b8851364e56cbacb8fab82

    • SHA512

      083c2225192987117d84bbbdbca228937f570fe31ca90aaff3a8cf6b4c1822a1b39523424723bc596056823c338cd7db193777b36487cf732bb526176935daa2

    • SSDEEP

      12288:/BvLTWCL5Bj6NdVFB2dDG8DLh3g1prEPwdOC18:RhTmNFB2f2bJfG

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks