General

  • Target

    0947847711.exe

  • Size

    908KB

  • Sample

    221102-r3514ahef8

  • MD5

    76c60d9a9521d9497cb840d5d41847d7

  • SHA1

    28f07c8dfc64e2be2a9cc8f3aab54885646ac8f7

  • SHA256

    0d606eb3c69db97a893c312e9cd2233c58c9814d143dfad71c2c7f9ae50b3b4c

  • SHA512

    ca37aba6718b3505b75e01a2d87a1738130966dabdbc3f7f9efbd26875a207683f9affe06c6fbb76c39250722e6d2c965f5881118686d0ef3813dd906e580901

  • SSDEEP

    12288:6lMUl+ouHH1JJ2iNXu2iNnkejwFGfXVNvS2twGy+KTz1QcPGmBl9cHlZ7VSS:u9u1j1A1reGfHLtX3K31wgSr

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      0947847711.exe

    • Size

      908KB

    • MD5

      76c60d9a9521d9497cb840d5d41847d7

    • SHA1

      28f07c8dfc64e2be2a9cc8f3aab54885646ac8f7

    • SHA256

      0d606eb3c69db97a893c312e9cd2233c58c9814d143dfad71c2c7f9ae50b3b4c

    • SHA512

      ca37aba6718b3505b75e01a2d87a1738130966dabdbc3f7f9efbd26875a207683f9affe06c6fbb76c39250722e6d2c965f5881118686d0ef3813dd906e580901

    • SSDEEP

      12288:6lMUl+ouHH1JJ2iNXu2iNnkejwFGfXVNvS2twGy+KTz1QcPGmBl9cHlZ7VSS:u9u1j1A1reGfHLtX3K31wgSr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks