General

  • Target

    17012025_1306_16012025_order details.zip

  • Size

    300KB

  • Sample

    250117-qb4taazjhl

  • MD5

    105e260e0fdc0ba1292ba02e788d4b87

  • SHA1

    29b3e4791d248d070d0d6c8151d44fd92eb4687c

  • SHA256

    e7a00b43e134549a1439d916c0eb202d39d1cc16c529e5bff0fd5e9d5f995ec1

  • SHA512

    5833e31ba277c0ddab0e2e1e1f20afea158de83982588582f9505db3003d329accde015bb301b5c0acba6784db470282c4ffd6ea06084cffef64f6be894d9059

  • SSDEEP

    6144:vwoWZlwBGmwCWNsTizBrg65DNTtiCP/vSX5YjtrwWmX8Asf:vwLZuGm63zaQTtiCHKXor3Ao

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      order details.exe

    • Size

      577KB

    • MD5

      15757c8ffb3728ac7610785b3ca1b186

    • SHA1

      88aaa2e67a78ad095b5d64f914891d51f23d43fb

    • SHA256

      f66016926c535dad4f77c27808f27fc316ea6b93a0a40e53b159d7821c9efa0f

    • SHA512

      ad23ac35f65b8114fc2aad0f981cafd039f27592984ab0fbfb637b0eef8420ae7e01828d65027025d8f9f88baa2ed33287814f86cccdc488448f010e0e449aaa

    • SSDEEP

      12288:ZbRKjP7newedqROaZhnRZJH54prTtmPhxo3////rK///I/////+z5tLf3XPgX:DKjP7ewedbKhVHWK6////G///I//////

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks