General

  • Target

    224c2921f5732b06fa7fc6224adfbc94.exe

  • Size

    636KB

  • Sample

    221125-jkt7wafb9y

  • MD5

    224c2921f5732b06fa7fc6224adfbc94

  • SHA1

    e3abef33761330122f1caf42e2cd1bbed381e53b

  • SHA256

    01856301804ce957c8ad34242cc6616a26fb17a245e65f7507d36aea4d54692f

  • SHA512

    29dd249a5a4eb6dcb737656cf473c9312f96de2788f87f6c967efdabc82f9e3ebdd8816961710701b173401ab43c027e124995f3b3ddb437b2c185113140cfd6

  • SSDEEP

    12288:LKeqOgh/PsZ1DX/VDJaccEjklQ2sxFkQSuMA5vBLG0:LgOgh/PBEwlUxLSuzJLG0

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      224c2921f5732b06fa7fc6224adfbc94.exe

    • Size

      636KB

    • MD5

      224c2921f5732b06fa7fc6224adfbc94

    • SHA1

      e3abef33761330122f1caf42e2cd1bbed381e53b

    • SHA256

      01856301804ce957c8ad34242cc6616a26fb17a245e65f7507d36aea4d54692f

    • SHA512

      29dd249a5a4eb6dcb737656cf473c9312f96de2788f87f6c967efdabc82f9e3ebdd8816961710701b173401ab43c027e124995f3b3ddb437b2c185113140cfd6

    • SSDEEP

      12288:LKeqOgh/PsZ1DX/VDJaccEjklQ2sxFkQSuMA5vBLG0:LgOgh/PBEwlUxLSuzJLG0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks