General

  • Target

    Order Details.exe

  • Size

    577KB

  • Sample

    250116-brs96atqay

  • MD5

    06c48ef3e45a7dafedbd596368918830

  • SHA1

    6ec2e82db6d702ddc0f4b302a4d8f02fd4c36c36

  • SHA256

    1e2333cb4fb3ecca06d22bb3b6255e5ac62b7ba43c3bceb8c17252657f34ba1e

  • SHA512

    075339ded9d2831723318812cc50ed50978548a1df7df82a57fb2cdab97a788e8ca220131fbdb24c1d5f456c089237a6561f05a01c71075352db060eec792088

  • SSDEEP

    12288:ZbRKjP7ne23gAcdtfD19UK/IBW+hb9LiRPXPgm:DKjP7e23gAcvfD1sW+Vo

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Order Details.exe

    • Size

      577KB

    • MD5

      06c48ef3e45a7dafedbd596368918830

    • SHA1

      6ec2e82db6d702ddc0f4b302a4d8f02fd4c36c36

    • SHA256

      1e2333cb4fb3ecca06d22bb3b6255e5ac62b7ba43c3bceb8c17252657f34ba1e

    • SHA512

      075339ded9d2831723318812cc50ed50978548a1df7df82a57fb2cdab97a788e8ca220131fbdb24c1d5f456c089237a6561f05a01c71075352db060eec792088

    • SSDEEP

      12288:ZbRKjP7ne23gAcdtfD19UK/IBW+hb9LiRPXPgm:DKjP7e23gAcvfD1sW+Vo

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks