General

  • Target

    717d346bd75687b1141a5ba89e06a42c.exe

  • Size

    1.5MB

  • Sample

    210118-kagqxg3jln

  • MD5

    717d346bd75687b1141a5ba89e06a42c

  • SHA1

    a8b7a4a15866609c19c7f4e3b0f0f460c76b14e9

  • SHA256

    2ffa6649ad0da183479cf5b33f23cf2b5ec55fa2171e144207032f94eb1fddc2

  • SHA512

    46bc4a8836abccf0bb2bba92802b70bc1d8eb543dbeee9923668a6cc4037b73533773b688257a34d082e1a4b947d189b3553caf410183cf1ad4517c520b987de

Malware Config

Targets

    • Target

      717d346bd75687b1141a5ba89e06a42c.exe

    • Size

      1.5MB

    • MD5

      717d346bd75687b1141a5ba89e06a42c

    • SHA1

      a8b7a4a15866609c19c7f4e3b0f0f460c76b14e9

    • SHA256

      2ffa6649ad0da183479cf5b33f23cf2b5ec55fa2171e144207032f94eb1fddc2

    • SHA512

      46bc4a8836abccf0bb2bba92802b70bc1d8eb543dbeee9923668a6cc4037b73533773b688257a34d082e1a4b947d189b3553caf410183cf1ad4517c520b987de

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks