General

  • Target

    SMK_15092022.exe

  • Size

    376KB

  • Sample

    220915-hh68zsfhck

  • MD5

    d9bff9930496047451f5770d88e3a52a

  • SHA1

    c8ba0c6ae14305d40b15d66b1461ae8a0fdb295c

  • SHA256

    9e92f7b80ee4c8621bb79fc1118fa2f57cd3afb6c5e43a26ac7f87d21bd9a0e7

  • SHA512

    6a4118a68af437673621e386eeb8fc290069687411989f61a2604fa3ae12104aa6addb221f5ecbf23923fb8b27dbaf09266d5822b9c257077ae96f27691b09a0

  • SSDEEP

    6144:eiveYyVDkzmmMHNMZsKd/HRiJjBysi+Bf:eive5VDkqmqNMsKdvRiRgiBf

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SMK_15092022.exe

    • Size

      376KB

    • MD5

      d9bff9930496047451f5770d88e3a52a

    • SHA1

      c8ba0c6ae14305d40b15d66b1461ae8a0fdb295c

    • SHA256

      9e92f7b80ee4c8621bb79fc1118fa2f57cd3afb6c5e43a26ac7f87d21bd9a0e7

    • SHA512

      6a4118a68af437673621e386eeb8fc290069687411989f61a2604fa3ae12104aa6addb221f5ecbf23923fb8b27dbaf09266d5822b9c257077ae96f27691b09a0

    • SSDEEP

      6144:eiveYyVDkzmmMHNMZsKd/HRiJjBysi+Bf:eive5VDkqmqNMsKdvRiRgiBf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks