General

  • Target

    98764323456789.exe

  • Size

    269KB

  • Sample

    221228-y2pfaabe24

  • MD5

    fda22fe3632bb7648d8d8b664f9a9e1e

  • SHA1

    a4d4ef7f13165f813795005dfe2dc65d3129bf10

  • SHA256

    5979638071b5f7d1795f076373eed65567a97b4718c2ba64089457d40b121dbd

  • SHA512

    b0ee136b5eb3a96c91ad86f70e218bf2d1c299b172756a039475866ffd1fcafb788631aad808bd4d2ec07fe77ee67f1efeb13020c066408ce826ce2221419bb0

  • SSDEEP

    6144:HuFDutOc6duxKLoll4Z7zQXcusLChGwq9n0Gh1c09zYsX4w6acMzeoCD6UnfnSt:OFDutOc6duxKLov4Z7zQX+F9z1Xb6aTO

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      98764323456789.exe

    • Size

      269KB

    • MD5

      fda22fe3632bb7648d8d8b664f9a9e1e

    • SHA1

      a4d4ef7f13165f813795005dfe2dc65d3129bf10

    • SHA256

      5979638071b5f7d1795f076373eed65567a97b4718c2ba64089457d40b121dbd

    • SHA512

      b0ee136b5eb3a96c91ad86f70e218bf2d1c299b172756a039475866ffd1fcafb788631aad808bd4d2ec07fe77ee67f1efeb13020c066408ce826ce2221419bb0

    • SSDEEP

      6144:HuFDutOc6duxKLoll4Z7zQXcusLChGwq9n0Gh1c09zYsX4w6acMzeoCD6UnfnSt:OFDutOc6duxKLov4Z7zQX+F9z1Xb6aTO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks