General

  • Target

    00938374.rar

  • Size

    508KB

  • Sample

    221017-s263faccc8

  • MD5

    bbbabc4d78ec3846a04303293c99aaa8

  • SHA1

    0818394e75fe22650b57d911e4b97e2aa8d055ab

  • SHA256

    afd392239889b1539cf39e18fa7f25a7a0fa8fa61fcd93a60ecc807b7716b13f

  • SHA512

    7dd4cd0887dec143003a4f04efa68c90335c0e5c139321d80eb212a81ab7851ef6d73d542c6a3d37fdd31c1d7a7cf6ea5af8794551102b2c3d8a227520ac57ca

  • SSDEEP

    12288:YPY8+oq7nHObjI4w1xg8mvsotYdFWg1ZUhFopTfQHTq9oKa:sY8ucd8mvszdFt1ZUs1QWWKa

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      00938374.exe

    • Size

      809KB

    • MD5

      26f34dcbb5e144fb1d55e2b7ae9e6eb9

    • SHA1

      85b5039d320669ceb664362b02451e2cc0d2a891

    • SHA256

      c76ab20e58193b2d01eab39426138c5e7fea3e7260523f48546aebaebe703239

    • SHA512

      34a173e2ea290f54e08716939065f5a4affb20f7406aa1c88aa6a97dcf02964d7eacd0e829ff18ce319a6debec99b479e6dc80542df0d92420624581c2e892f1

    • SSDEEP

      12288:3/RA/TCnwdvzvGRXx+5gKB4a/0dB5sWHNsjs/:3/RG8w9iRh+D8dB5sW

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks