General

  • Target

    INV0021700.exe

  • Size

    282KB

  • Sample

    220928-tp87pshfam

  • MD5

    506d64b050492f1d7df72e2674b19c8e

  • SHA1

    aa2d592f909ea6b8994f86376f40b09e810bb9ca

  • SHA256

    df98ed55541117bdff277ebd91d4bf05bbf4c0d64c649a3448f90eafd1ad828d

  • SHA512

    08cf1936a9eb8d307aa5e9f3f4d2013e05bfcc33535f0140a4f7672042dea230f3dc0503eccbd9b0e24e6d35cacc1c9024fcb0722f4a7c156458b8b43ead1cb9

  • SSDEEP

    6144:TDBkuri/tJaSDAuOjenFltBeTyZJVrLYl4v4pxEbFe:T1kwMAiQenFnE4JV/KMYEY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      INV0021700.exe

    • Size

      282KB

    • MD5

      506d64b050492f1d7df72e2674b19c8e

    • SHA1

      aa2d592f909ea6b8994f86376f40b09e810bb9ca

    • SHA256

      df98ed55541117bdff277ebd91d4bf05bbf4c0d64c649a3448f90eafd1ad828d

    • SHA512

      08cf1936a9eb8d307aa5e9f3f4d2013e05bfcc33535f0140a4f7672042dea230f3dc0503eccbd9b0e24e6d35cacc1c9024fcb0722f4a7c156458b8b43ead1cb9

    • SSDEEP

      6144:TDBkuri/tJaSDAuOjenFltBeTyZJVrLYl4v4pxEbFe:T1kwMAiQenFnE4JV/KMYEY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks