General

  • Target

    order6566546663.exe

  • Size

    577KB

  • Sample

    250116-bsdabsvqem

  • MD5

    71bd2f038e92ae0e3b95a7567511458e

  • SHA1

    816293b2472e394288fc9c91bdff206ab8ef52e2

  • SHA256

    13ba4ee3d7accddd8dbce8e4bc4a623e0b7bf30350fe9d58f1c269cd744bb835

  • SHA512

    6504c277444190aff4ec14dfc0a9a47c84a61eaaa772088cd003cb93589334e8bd8e79928578b4f5fd61783f97c6317c22d75777db5bba53058c21ab797b40b6

  • SSDEEP

    12288:ZbRKjP7ne23gAcdtfD1IWPUK/IBW+hb9LiMPXPgm:DKjP7e23gAcvfD1IhW+VR

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      order6566546663.exe

    • Size

      577KB

    • MD5

      71bd2f038e92ae0e3b95a7567511458e

    • SHA1

      816293b2472e394288fc9c91bdff206ab8ef52e2

    • SHA256

      13ba4ee3d7accddd8dbce8e4bc4a623e0b7bf30350fe9d58f1c269cd744bb835

    • SHA512

      6504c277444190aff4ec14dfc0a9a47c84a61eaaa772088cd003cb93589334e8bd8e79928578b4f5fd61783f97c6317c22d75777db5bba53058c21ab797b40b6

    • SSDEEP

      12288:ZbRKjP7ne23gAcdtfD1IWPUK/IBW+hb9LiMPXPgm:DKjP7e23gAcvfD1IhW+VR

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks