General

  • Target

    31012025_0818_30012025_FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.img

  • Size

    88KB

  • Sample

    250131-j7bdaasncp

  • MD5

    669b3179120601e9d9b7acfa0cb99756

  • SHA1

    aed46f29462179cb05a74a2d484f95ed1c1cf444

  • SHA256

    4c577d699400716fdafd50da035d7179bde0a6e0f5d99a881a258f7930395122

  • SHA512

    908b245c7692cd10ed4808d64bdb44fa7edbecebcd7a81d4db5359d7e0fdf832418c4b0da88a45b459d225dbeb971a90bcb251b2b0ee990565be6d7449b5017a

  • SSDEEP

    384:GnwjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:GwHvSPo8gBoV09GW6GAcKxX+

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      FACTURA NAVLU 246735688 30.01.25 DSV 4500728783.exe

    • Size

      26KB

    • MD5

      c4b6e9359dac142bc8669819f9bf6092

    • SHA1

      32e7b0d35ddc72c5781825d303941d5ea17ae828

    • SHA256

      96a7766f5d19b90a2818078ea5d88c40dfa121fd812216cf5cba3b48e0708b79

    • SHA512

      ffc1648f771e4af44dd0327084b301036503c7c5d4f0929b543ed6588a7ff0597e5f6d49f03edea8458ba301f9d6b4f155b7a8de75fb1cf5e410369c51394f97

    • SSDEEP

      384:LjLHvSSTjrknoQlgaYG3lzH0vkLV0MteGv6H6GkncKxX+:LHvSPo8gBoV09GW6GAcKxX+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks