General

  • Target

    44da9de9c46bbfbc4ed8c86636f3d4da290214ae8b389c804d6ceedc0a66cfef

  • Size

    326KB

  • Sample

    241208-eagrks1las

  • MD5

    f8cec31e3822904c1320cd7e2ec3b539

  • SHA1

    a68ae92a3f5f736d773eeb851d51c9de9c11b91c

  • SHA256

    44da9de9c46bbfbc4ed8c86636f3d4da290214ae8b389c804d6ceedc0a66cfef

  • SHA512

    4a9d4693db62f20d8621f0b5c5dc70beb34e2e6642555f891757c4d5f93a8bea8b85d1d8c12e83ac2bfc6a5512527892636a3c255cec2ba7101cbc8cac6d46de

  • SSDEEP

    6144:6VFR5eh3eyqXmxRpgQHV8Na6GDqROSf5Jw/9F7RruuCfTZpN2:6HRohMWRvV8vtRJU9F7RrIVC

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Shipment details.exe

    • Size

      540KB

    • MD5

      c4407cbd68725778ecd99dc7638be000

    • SHA1

      0a232725a5857010de9eb61837fe6bbb3a6e151f

    • SHA256

      2b8887e80909f776f73b07b6870c4f3f3be8697560e693a4786707d76aae4c01

    • SHA512

      4ba0d5c953ce0ee4c984f36360c60fa4212d77633ec24b8bbff91ead5dbbd853272c9c6b4700e0db6865bc6678bd356c039a7623d134ff44068e107b3ad80376

    • SSDEEP

      12288:YiU+RfWk1Sm5bpviLs+fMKqirYo4A4OPoTo84RPlA24:Yi3fWxIbZiLsSPWotf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks