General

  • Target

    02022025_1233_Faktura VAT-FV2025013100092_pdf .scr.iso

  • Size

    90KB

  • Sample

    250202-pq936s1qbz

  • MD5

    ec2e5e78cb9f96d6fc884ebe21c2ff78

  • SHA1

    f45d6d685598bdf3da6e436fa9b34fa1f33b21ee

  • SHA256

    6b1c2144b4fde66439a0632914f1548b922fc251a3889c445d2d68c64c80bb06

  • SHA512

    73441246451a96e0eadf178b194b2aedc8b673c7e7ddb499fe5721ef0e65a55d563a167411d9e682a9bbf942027bbebb5b29ab75882a7527a16d77fb042cde20

  • SSDEEP

    768:SfEtDBZdaNLXc0oZKNuPYlmwK3xKeL7BykIM:wEtDBZdqLcNgcYYTbBykr

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Faktura VAT-FV2025013100092_pdf .scr

    • Size

      30KB

    • MD5

      0e5971e91dd1db9deb1fb0423dfb7f86

    • SHA1

      77550fc14cc113302e033b388af34e325b3cffa3

    • SHA256

      9a46f9b65992fa05b30ff12b672bcc3c2bb9eb4a1ed3b18c41ab00912fa1ffef

    • SHA512

      6aa1fc7cf57c872dbb5b2c6afc42cebb5c6acad1f8c9c939690529c931c780eb6b13e0a0ac4dce90c2b6a325334b3dbf2b7273564379c8eb5d4a9a2ad20f0e55

    • SSDEEP

      768:zEtDBZdaNLXc0oZKNuPYlmwK3xKeL7BykIM:zEtDBZdqLcNgcYYTbBykr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks