General

  • Target

    4fc184671e57d103f1d4d2522d561c4e36d0eb1b221c4f05e5e77e044fbc3570

  • Size

    767KB

  • Sample

    221128-cdl5csfb74

  • MD5

    b7cc6fa087d322f6075d16ada8332f3c

  • SHA1

    2e1e65d0efdca11b5067105d5c458cb19eedaa2e

  • SHA256

    4fc184671e57d103f1d4d2522d561c4e36d0eb1b221c4f05e5e77e044fbc3570

  • SHA512

    84a38226f9fb0d69b7b58cf05e5a76f4d0fd2ae3c4002a6dfc93e1d7d1abd116773872abc22a45108fc6e44297b2f16e82bb0e74e5f2a384ef0c5218bfea3d65

  • SSDEEP

    12288:lTGYi0MDFPIAx2HTuBjBSe8LZ8PIIXfK1niI9QFPsIg95lvTHRyoYM:lDCSG6Z8LXf8iIiFsIgvpjRpYM

Malware Config

Targets

    • Target

      4fc184671e57d103f1d4d2522d561c4e36d0eb1b221c4f05e5e77e044fbc3570

    • Size

      767KB

    • MD5

      b7cc6fa087d322f6075d16ada8332f3c

    • SHA1

      2e1e65d0efdca11b5067105d5c458cb19eedaa2e

    • SHA256

      4fc184671e57d103f1d4d2522d561c4e36d0eb1b221c4f05e5e77e044fbc3570

    • SHA512

      84a38226f9fb0d69b7b58cf05e5a76f4d0fd2ae3c4002a6dfc93e1d7d1abd116773872abc22a45108fc6e44297b2f16e82bb0e74e5f2a384ef0c5218bfea3d65

    • SSDEEP

      12288:lTGYi0MDFPIAx2HTuBjBSe8LZ8PIIXfK1niI9QFPsIg95lvTHRyoYM:lDCSG6Z8LXf8iIiFsIgvpjRpYM

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks