General

  • Target

    arinzezx.exe

  • Size

    918KB

  • Sample

    230208-rey8msag4y

  • MD5

    b7820bc9cd73d4378a5d7017aad0b803

  • SHA1

    d5df3228d5683a4648b2998cdff593e667860ea3

  • SHA256

    1092d7ec9366334de4f4a244154a01816d343523764573546eceec51f5e36976

  • SHA512

    b55389c636776edad9c4c757b9eed3b1984d33e072868d6591634c987b3da286297de5ac41047722baec39a2bacac96880dceb518912be7b1a927dffa6916a9c

  • SSDEEP

    24576:J1bgzPGhgzfYdqVEtFAE7fNnACQ+iZ0EwMYeT:JZyPyyw8aeCQ+M1wMYeT

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      arinzezx.exe

    • Size

      918KB

    • MD5

      b7820bc9cd73d4378a5d7017aad0b803

    • SHA1

      d5df3228d5683a4648b2998cdff593e667860ea3

    • SHA256

      1092d7ec9366334de4f4a244154a01816d343523764573546eceec51f5e36976

    • SHA512

      b55389c636776edad9c4c757b9eed3b1984d33e072868d6591634c987b3da286297de5ac41047722baec39a2bacac96880dceb518912be7b1a927dffa6916a9c

    • SSDEEP

      24576:J1bgzPGhgzfYdqVEtFAE7fNnACQ+iZ0EwMYeT:JZyPyyw8aeCQ+M1wMYeT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks