General

  • Target

    Facture 240247.rar

  • Size

    496KB

  • Sample

    240702-l4le7a1drm

  • MD5

    22ccd719a9db6d778362b700ca39a866

  • SHA1

    a1c875b4bbfbc63acdb6cb4c51eb66e7fe62c9b8

  • SHA256

    49d19cfc322b0fd721b7a287bfc1502d9d25f57f06f573bf53b05e165c5871ae

  • SHA512

    56b1fe87ac5489cd14a76c7c921614f05b3af3f82e14e65e6bc410539edd5633d474ab996d023ee938229aa649fbd92ee1e953bdc5f6121dcc77e0e7b8a83897

  • SSDEEP

    12288:KY/zu56nWvHViTVyEdCRDHipOFk8NBNh1OfDA:KY/OoTEEU9rPNifDA

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      whiteee.exe

    • Size

      1.0MB

    • MD5

      9a961cdb405219d714347c06a7a6a995

    • SHA1

      2bf6f2e31d453c52685f8ffeaa52056aa727674d

    • SHA256

      2cbc13099ee1ba4b8c671bfca525bb2c5c057c2fc13df105dec2852a8b672e50

    • SHA512

      c016af696bf4b3eb6d27a61afc6760eee7d50624ee198e9d64562564ee6f5243508edf215b5325010ee9a484cbe4d218bc6beb52eefe9a548738022e82fedf3f

    • SSDEEP

      24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8af3BG5kPJ:tTvC/MTQYxsWR7afJ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks