General

  • Target

    arinzezx.exe

  • Size

    751KB

  • Sample

    230207-rqapescb45

  • MD5

    f95a568151abf6cdbc78288f24352733

  • SHA1

    9e8d4ecd93cb80f07f959c850273b83e8066ddaf

  • SHA256

    3669f96c22728c600ea409d6a0ebf8f66ee8ca7eaf50a5f1767f2086b7081d76

  • SHA512

    6150be1404f34feaa112a80c0e9a4ab15313b4ed04037b5dfa4e33de14018f14bdb37b09033fe3ea7be9dac1e190d1cab8a8f3f31e8a67583c9890e3916a7d4b

  • SSDEEP

    12288:hMaBkhgfZIG0UGrJPg/ZsvsbkNENbpOr9k9sb/y9AGFCRshawHRr/CB06KuLp4b8:hM+xfZIG0UGNIhs5abpOu90q9AdKhawT

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      arinzezx.exe

    • Size

      751KB

    • MD5

      f95a568151abf6cdbc78288f24352733

    • SHA1

      9e8d4ecd93cb80f07f959c850273b83e8066ddaf

    • SHA256

      3669f96c22728c600ea409d6a0ebf8f66ee8ca7eaf50a5f1767f2086b7081d76

    • SHA512

      6150be1404f34feaa112a80c0e9a4ab15313b4ed04037b5dfa4e33de14018f14bdb37b09033fe3ea7be9dac1e190d1cab8a8f3f31e8a67583c9890e3916a7d4b

    • SSDEEP

      12288:hMaBkhgfZIG0UGrJPg/ZsvsbkNENbpOr9k9sb/y9AGFCRshawHRr/CB06KuLp4b8:hM+xfZIG0UGNIhs5abpOu90q9AdKhawT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks