General

  • Target

    20012025_1552_20012025_LETTER OF AUTHORIZATION.zip

  • Size

    604KB

  • Sample

    250120-ta7qbsxkbj

  • MD5

    d76d2911f884df8dab209a9e399bccf6

  • SHA1

    7dbf3c8e920e9f532d69d467f5563b756cf773dc

  • SHA256

    fe6402cb56844ea02e9d99b45ec657bf4716b5d61fa057894f811e665366571d

  • SHA512

    063a4e6203a95686381c419985317ada14b5fcc3532746e63b2d9281bafff1f246af9d42468faf079cc5c9d73a9d0cc6fd7db57ad67cf76a99cd9932f17a1a45

  • SSDEEP

    12288:ZWqCIW3Ll4g/ozVp0LqkOplsk+xL9rOLmJaeBym2AWyaKCWzah8q8kfHXu:ZTCIa4g/owOHsVxZOAWyyWMFDPe

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      LETTER OF AUTHORIZATION.exe

    • Size

      1.2MB

    • MD5

      c787d6c746ed6c0d08e0d7ce05012b56

    • SHA1

      614d8f36a2016bfa67472876383f9ab2ae55fe48

    • SHA256

      6ed8984ec6982853a97d73d735054cb897d4acea75e284b9a5493086917206e7

    • SHA512

      de60d9babe7bf3b7f0e729bb02ac7a7536b7b17b7ca869a34c07571535fa551e10a20f43de79f563cdb84c32ff3119e2c258157e133924c74f27c284cf3dc2a1

    • SSDEEP

      24576:7Sexfdr7yJ96EbKNxpXq7TYA2rQtlHPI4Q:mNIEbKzVQB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks