General

  • Target

    02022025_1236_Inquiry IP250009 AF2506595_pdf .scr.iso

  • Size

    90KB

  • Sample

    250202-pszp8a1qht

  • MD5

    0be00e4ad3ceaa683cf8ea3dfbbb9068

  • SHA1

    da4fd004e85104086dc2a5a7c1f7313b79ee15b2

  • SHA256

    30c4337662cb4e4f3a850b22075a4354642552c136839a2282139d3e20ad59bc

  • SHA512

    4edda3df6d9a3caca10b3c9b9a70112d72b5de0a06d41124c8d7e2e5f3d9ee704665af134724469026a900dee51d17016db0a3314f054995ca894fb3b171aaec

  • SSDEEP

    768:RFEtDBZdaNLXc0oZKNuPYlmwK3xKeL7BykIM:zEtDBZdqLcNgcYYTbBykr

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Inquiry IP250009 AF2506595_pdf .scr

    • Size

      30KB

    • MD5

      0e5971e91dd1db9deb1fb0423dfb7f86

    • SHA1

      77550fc14cc113302e033b388af34e325b3cffa3

    • SHA256

      9a46f9b65992fa05b30ff12b672bcc3c2bb9eb4a1ed3b18c41ab00912fa1ffef

    • SHA512

      6aa1fc7cf57c872dbb5b2c6afc42cebb5c6acad1f8c9c939690529c931c780eb6b13e0a0ac4dce90c2b6a325334b3dbf2b7273564379c8eb5d4a9a2ad20f0e55

    • SSDEEP

      768:zEtDBZdaNLXc0oZKNuPYlmwK3xKeL7BykIM:zEtDBZdqLcNgcYYTbBykr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks