General

  • Target

    F0733456789--9800.exe

  • Size

    433KB

  • Sample

    221230-h94beafb58

  • MD5

    e777911445e1a00af8d6f88cd467dcb3

  • SHA1

    5e472cd56836df1fe990c034e88165ae303f3a3d

  • SHA256

    8c4cc2077f0eab36be58bb86b34035f1b9c133902630526f609ff0c194f4f236

  • SHA512

    678cb36105e68dab7bb80d60a9aee0b3ceaa6f4d653be2460cf7005f17e1217ac2b315415d66fb3d794c02e6bb141bfd5be9fa354ef9bf01a3484e95bfceee94

  • SSDEEP

    6144:WYa6SA8zQoYvVrB20NsP2uyjt91yLGJfhavFAHQhhoy64utZivMpFhhsZA1:WY0A8z3Y9BNeejksPA64utZivMptsi

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      F0733456789--9800.exe

    • Size

      433KB

    • MD5

      e777911445e1a00af8d6f88cd467dcb3

    • SHA1

      5e472cd56836df1fe990c034e88165ae303f3a3d

    • SHA256

      8c4cc2077f0eab36be58bb86b34035f1b9c133902630526f609ff0c194f4f236

    • SHA512

      678cb36105e68dab7bb80d60a9aee0b3ceaa6f4d653be2460cf7005f17e1217ac2b315415d66fb3d794c02e6bb141bfd5be9fa354ef9bf01a3484e95bfceee94

    • SSDEEP

      6144:WYa6SA8zQoYvVrB20NsP2uyjt91yLGJfhavFAHQhhoy64utZivMpFhhsZA1:WY0A8z3Y9BNeejksPA64utZivMptsi

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks