General

  • Target

    20220825131165.exe

  • Size

    385KB

  • Sample

    220919-jxrmhsbdgq

  • MD5

    338b57edc0e5a428f0c7b0ca6c09b7bd

  • SHA1

    122ce42ba55283d40d12a227a0c8a18a0e578f0a

  • SHA256

    04817d678b5f79b764e0edd16ddd140c9209ace4bd7a72bdd134b4191fdd532d

  • SHA512

    9bc169d5197e61afbe0e61e405b65d79e866cdf51f6dc82e0c30164c344a3fc33ef104c26b52d3cc40e9c79257036e4a4c1a434a2db93ec10b2adde5db6bc42d

  • SSDEEP

    6144:Y3Kt8Z5C3vHVd/SUhLIMgwac5+Nm5dX1RwX8MOlc:4c8Z5CfHHJIMgwvem57+X4c

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      20220825131165.exe

    • Size

      385KB

    • MD5

      338b57edc0e5a428f0c7b0ca6c09b7bd

    • SHA1

      122ce42ba55283d40d12a227a0c8a18a0e578f0a

    • SHA256

      04817d678b5f79b764e0edd16ddd140c9209ace4bd7a72bdd134b4191fdd532d

    • SHA512

      9bc169d5197e61afbe0e61e405b65d79e866cdf51f6dc82e0c30164c344a3fc33ef104c26b52d3cc40e9c79257036e4a4c1a434a2db93ec10b2adde5db6bc42d

    • SSDEEP

      6144:Y3Kt8Z5C3vHVd/SUhLIMgwac5+Nm5dX1RwX8MOlc:4c8Z5CfHHJIMgwvem57+X4c

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks