General

  • Target

    order details.exe

  • Size

    577KB

  • Sample

    250117-ey8j7sspbp

  • MD5

    15757c8ffb3728ac7610785b3ca1b186

  • SHA1

    88aaa2e67a78ad095b5d64f914891d51f23d43fb

  • SHA256

    f66016926c535dad4f77c27808f27fc316ea6b93a0a40e53b159d7821c9efa0f

  • SHA512

    ad23ac35f65b8114fc2aad0f981cafd039f27592984ab0fbfb637b0eef8420ae7e01828d65027025d8f9f88baa2ed33287814f86cccdc488448f010e0e449aaa

  • SSDEEP

    12288:ZbRKjP7newedqROaZhnRZJH54prTtmPhxo3////rK///I/////+z5tLf3XPgX:DKjP7ewedbKhVHWK6////G///I//////

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      order details.exe

    • Size

      577KB

    • MD5

      15757c8ffb3728ac7610785b3ca1b186

    • SHA1

      88aaa2e67a78ad095b5d64f914891d51f23d43fb

    • SHA256

      f66016926c535dad4f77c27808f27fc316ea6b93a0a40e53b159d7821c9efa0f

    • SHA512

      ad23ac35f65b8114fc2aad0f981cafd039f27592984ab0fbfb637b0eef8420ae7e01828d65027025d8f9f88baa2ed33287814f86cccdc488448f010e0e449aaa

    • SSDEEP

      12288:ZbRKjP7newedqROaZhnRZJH54prTtmPhxo3////rK///I/////+z5tLf3XPgX:DKjP7ewedbKhVHWK6////G///I//////

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks