General

  • Target

    3638367090aa7b5f444c76c0d1af9582.exe

  • Size

    1.5MB

  • Sample

    210118-ybnaxtqwns

  • MD5

    3638367090aa7b5f444c76c0d1af9582

  • SHA1

    a4e716b571658f57886dbd60e36e2f65b8310c99

  • SHA256

    ef3e4d2d8d25c9193cf0ba20d5f41cab19134f6b78b649709b21667d217ecd8f

  • SHA512

    cced63914fee8f6849083cf6cd4eecfd11837fdb192ecbc469d6c2fbb706d1b1bc3edd3ec8e3bd44548c93d9ea8cb7bc3742bd4134f8a52d5481f65e173d376e

Malware Config

Targets

    • Target

      3638367090aa7b5f444c76c0d1af9582.exe

    • Size

      1.5MB

    • MD5

      3638367090aa7b5f444c76c0d1af9582

    • SHA1

      a4e716b571658f57886dbd60e36e2f65b8310c99

    • SHA256

      ef3e4d2d8d25c9193cf0ba20d5f41cab19134f6b78b649709b21667d217ecd8f

    • SHA512

      cced63914fee8f6849083cf6cd4eecfd11837fdb192ecbc469d6c2fbb706d1b1bc3edd3ec8e3bd44548c93d9ea8cb7bc3742bd4134f8a52d5481f65e173d376e

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks