General

  • Target

    QUOTATION_DECQTRA071244uPDF.scr

  • Size

    1.4MB

  • Sample

    241205-kc48jssmar

  • MD5

    1a07ab467f5ef0ce3e7733a718538477

  • SHA1

    475792452dd61c6dd023159284b6ae9e0f6581ac

  • SHA256

    7e2a41007de15f145fd141b8fe26d97be4e3078bc5ae31dce3f7d73a4c330da1

  • SHA512

    bc55a5debb917da962a92873797d6421901b10dcc3c75249fadae595cb7db433affc932b87e836ea1b898ce8df0c9e9068a3252eb1d3964100b7d43a574e65df

  • SSDEEP

    24576:3v7/cWsAmR+M9o+NK/Jld5NGXO5GuiJIjNZUAloJZRNcdZtO:3brsXR8+NKx/5NGeENJWN6AmJSdz

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      QUOTATION_DECQTRA071244uPDF.scr

    • Size

      1.4MB

    • MD5

      1a07ab467f5ef0ce3e7733a718538477

    • SHA1

      475792452dd61c6dd023159284b6ae9e0f6581ac

    • SHA256

      7e2a41007de15f145fd141b8fe26d97be4e3078bc5ae31dce3f7d73a4c330da1

    • SHA512

      bc55a5debb917da962a92873797d6421901b10dcc3c75249fadae595cb7db433affc932b87e836ea1b898ce8df0c9e9068a3252eb1d3964100b7d43a574e65df

    • SSDEEP

      24576:3v7/cWsAmR+M9o+NK/Jld5NGXO5GuiJIjNZUAloJZRNcdZtO:3brsXR8+NKx/5NGeENJWN6AmJSdz

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks