General

  • Target

    16012025_0103_15012025_Vessel particulars.zip

  • Size

    300KB

  • Sample

    250116-beldsatkbz

  • MD5

    4a7be7f41db125dbd1105896989c78ee

  • SHA1

    2c493ba08489461776fca30277e06ae2b028699a

  • SHA256

    8486657f43e4a772dd2897bf5518f792ce415953315105041cba5fd0f29c974d

  • SHA512

    3048da5124168a1179e2961a90f5026bda616fc38e78d8eb6a78e8b8afa65a2c20cd2023d137b832831617812133871508a01b33a6cc3bd42b91c3064f5677de

  • SSDEEP

    6144:0woVkO+hHXtSTeKZt7FOOSeqtRwP0oik7wrdKnf7O00b2:0wu+hH0Teat71PqtRwqIwpKnfV0b2

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Vessel particulars.exe

    • Size

      577KB

    • MD5

      0fdbcbb3889319d8ce5951f8e6fd44b9

    • SHA1

      80580f39f716672c6f153449148607d48e323c17

    • SHA256

      c6c831bce42aaeb26dc18e8c54b3b101ece31a3dccd0ce563bb538602edc9c32

    • SHA512

      c6eb85409f0638051ce07ba119b645b79781af9b7a6f682df17d0f69788fd2a5f0a98b126ca76c57bcb5996333a042c31b0f83a288d7fa983f7f34ff85d98b2a

    • SSDEEP

      6144:ZbRKjP7nVEP1ACMeFAKtgRH1YyyQ3izJ5vSPdfpkzk6cjfn4k1LzVFRfGcUPgf3H:ZbRKjP7nep7FQrlsgdfpkfcvfGXPg/

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks