General

  • Target

    31012025_0108_sutartis - užsakymas 30.01.25 UAB SVF Trade 4500728783.exe.iso

  • Size

    88KB

  • Sample

    250131-bhk77awre1

  • MD5

    c9bdc515a5f1086d287d93cc66fd8464

  • SHA1

    77033aa1c89117930e2d1bb80057ce8772ebe62c

  • SHA256

    f3c346a9367baf1b29a9ea94bb847b180276869df8060ed57ede720592df11a0

  • SHA512

    370cb22c9ffad653f9590cf6936c32722e3f4e323a0bc46eaa6b9398bf2535649f05bea3cca0b6708d57011e1b2aa020ba0532c4b31de1f2dae08c6871747430

  • SSDEEP

    384:GgajLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:GhHvSPo8gBoV09GW6GAcKxX+

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      sutartis - užsakymas 30.01.25 UAB SVF Trade 4500728783.exe

    • Size

      26KB

    • MD5

      c4b6e9359dac142bc8669819f9bf6092

    • SHA1

      32e7b0d35ddc72c5781825d303941d5ea17ae828

    • SHA256

      96a7766f5d19b90a2818078ea5d88c40dfa121fd812216cf5cba3b48e0708b79

    • SHA512

      ffc1648f771e4af44dd0327084b301036503c7c5d4f0929b543ed6588a7ff0597e5f6d49f03edea8458ba301f9d6b4f155b7a8de75fb1cf5e410369c51394f97

    • SSDEEP

      384:LjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:LHvSPo8gBoV09GW6GAcKxX+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks