General

  • Target

    e1bc68f654672190e29c66dd669c5a84ada74179ba831f7cbe1c5005b6d9e399.img

  • Size

    90KB

  • Sample

    250103-e98z4szlez

  • MD5

    47ea738be27c3f0886b29f2928ecda32

  • SHA1

    9e95d9b748cbe907a71e7bff6d8d7e69d68aad8f

  • SHA256

    e1bc68f654672190e29c66dd669c5a84ada74179ba831f7cbe1c5005b6d9e399

  • SHA512

    c295c192b88739d758953e3495186dcfdb7830f317082d94f0f29c2b93a0c2316f97ccd3a6bd5a710b8e54b0b07fba719ed076f706d6107bcdfcd5ef259af39d

  • SSDEEP

    384:XP6CrfkPn9DJFNBe8agPPo/i7ydGMXT8JHSdfhvMCELIA+YjzE679q6VD9u8Qv5/:Xt7wn9Dy8PPnyd5GuYxDF94R

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      HBL - 446222025 Vapor MAERSK BOGOR448S.exe

    • Size

      29KB

    • MD5

      eb6a1705873b7a3a9bea8074f4e4d69a

    • SHA1

      4033b84b870606916c4ad67df1080f9b3757d118

    • SHA256

      035fd9019348ef838afdb9663b147828c3523347699551e03ac73f8da3d3e8b9

    • SHA512

      e1f760ff0dd26884dfcc368e0f1c5a341df4bbbda1955f8519d669904e1efe4195985c410fda24c214676b70bcabb6fe81cad5e95b8ed246ca4a13680700bd98

    • SSDEEP

      384:VCrfkPn9DJFNBe8agPPo/i7ydGMXT8JHSdfhvMCELIA+YjzE679q6VD9u8Qv5P7T:U7wn9Dy8PPnyd5GuYxDF94R

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks