General

  • Target

    whiteee.exe

  • Size

    1.0MB

  • Sample

    240702-hcw6tszhpd

  • MD5

    9a961cdb405219d714347c06a7a6a995

  • SHA1

    2bf6f2e31d453c52685f8ffeaa52056aa727674d

  • SHA256

    2cbc13099ee1ba4b8c671bfca525bb2c5c057c2fc13df105dec2852a8b672e50

  • SHA512

    c016af696bf4b3eb6d27a61afc6760eee7d50624ee198e9d64562564ee6f5243508edf215b5325010ee9a484cbe4d218bc6beb52eefe9a548738022e82fedf3f

  • SSDEEP

    24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8af3BG5kPJ:tTvC/MTQYxsWR7afJ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      whiteee.exe

    • Size

      1.0MB

    • MD5

      9a961cdb405219d714347c06a7a6a995

    • SHA1

      2bf6f2e31d453c52685f8ffeaa52056aa727674d

    • SHA256

      2cbc13099ee1ba4b8c671bfca525bb2c5c057c2fc13df105dec2852a8b672e50

    • SHA512

      c016af696bf4b3eb6d27a61afc6760eee7d50624ee198e9d64562564ee6f5243508edf215b5325010ee9a484cbe4d218bc6beb52eefe9a548738022e82fedf3f

    • SSDEEP

      24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8af3BG5kPJ:tTvC/MTQYxsWR7afJ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks