General

  • Target

    47ea738be27c3f0886b29f2928ecda32.bin

  • Size

    15KB

  • Sample

    250104-bllm5awjbl

  • MD5

    df6fd124cf53085f6afd55145eaaaa89

  • SHA1

    2635117ce8b49f3dd0db6efc092ca9386df8acca

  • SHA256

    e5bddb1a43b3ab059609efed7b33d8bc92170c5b266ffef060a6323b43d4d588

  • SHA512

    a85d1afee6db3e6c91d8e8f042a599700b5d27ad745ef94ae3261585cd258864579b17587ce27fc4a0ff72ae89888c611a011ce9f268521d22cb3b47ed3313c9

  • SSDEEP

    384:hQ4f34E9+cyD3BmwsF6GZHjFwR5mGHoR7+CYlTcjB/wW:64fTYcylmwsFRj0m2o9+J4z

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      HBL - 446222025 Vapor MAERSK BOGOR448S.exe

    • Size

      29KB

    • MD5

      eb6a1705873b7a3a9bea8074f4e4d69a

    • SHA1

      4033b84b870606916c4ad67df1080f9b3757d118

    • SHA256

      035fd9019348ef838afdb9663b147828c3523347699551e03ac73f8da3d3e8b9

    • SHA512

      e1f760ff0dd26884dfcc368e0f1c5a341df4bbbda1955f8519d669904e1efe4195985c410fda24c214676b70bcabb6fe81cad5e95b8ed246ca4a13680700bd98

    • SSDEEP

      384:VCrfkPn9DJFNBe8agPPo/i7ydGMXT8JHSdfhvMCELIA+YjzE679q6VD9u8Qv5P7T:U7wn9Dy8PPnyd5GuYxDF94R

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks