General

  • Target

    5ec222a90e9cabf1feb3741ed3215327b78d7dc967425fcb3c5298f9edf406ad

  • Size

    509KB

  • Sample

    241204-kj8jjszmds

  • MD5

    35d54ead23fc7d1d759796dfa5b371d7

  • SHA1

    f6679a8642b9627aa47aed09f12766463aac55f8

  • SHA256

    5ec222a90e9cabf1feb3741ed3215327b78d7dc967425fcb3c5298f9edf406ad

  • SHA512

    597ea1af17f05807b5f8585d1d33fbdcac894edec827b4559e28fb5421008d9a873b192acdaa353f4cf9878de08ad50cc104211683d5afb3e8b2b9bdedb0628b

  • SSDEEP

    12288:LJMlog3j13G/YfxHDS1TF2uuJ/1j9DHV9KfkHT:da3YC2F27BpHOfMT

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Shipping Documents.pdf.exe

    • Size

      740KB

    • MD5

      b270344e0a2760f0faacbe25670635bc

    • SHA1

      2677ed82fcc97bc63ddba361d4c0052058d263c5

    • SHA256

      f22cf9dc92fc4eee3eb35b4cdb613f21fa285d5f7630d2a898e25d4c5c512e5e

    • SHA512

      9cb8c9e211e28b9d989993fce4b93429c24f1db7a57c54a594888489568b4f42dee6c8fbadf189978d117e76bf6a85f710484892ecfb3d55ab6cffdde81cf59d

    • SSDEEP

      12288:npZsS4aTEaFP2BHykEW+7CGpfxNuWro8wFiQ4Cg0:nzsHaTEw7Jl7FpruWro8wF9g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks