General

  • Target

    IFS0076545678-98765456.exe

  • Size

    1.6MB

  • Sample

    230215-qxefhsbf9t

  • MD5

    bb757ad37313ea9480c3b22460ea8749

  • SHA1

    895ded88ec53c39eb247b746535befbfdeaaf1e8

  • SHA256

    846cf3836da3c05c0d9cc5b5061028294660b1349c44dbf0788d1ccbd837bb6e

  • SHA512

    46e30dc7b59b7c3f44bd870a95263cb2d1fae276ab9ca220dd83b8872bc9de362940c44033650443c97ebd5f8d0ceba192af3ad818a696a8ff97f0895200e10a

  • SSDEEP

    12288:gSO4asKoAeMYbjVGLRa5+79GpAhBDA4VGMeGE+tRaZn/+YgIr6gO/aXcz3GTMNIG:9eoAeMOjVG9m2O+Np8eche8R9oKEd

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      IFS0076545678-98765456.exe

    • Size

      1.6MB

    • MD5

      bb757ad37313ea9480c3b22460ea8749

    • SHA1

      895ded88ec53c39eb247b746535befbfdeaaf1e8

    • SHA256

      846cf3836da3c05c0d9cc5b5061028294660b1349c44dbf0788d1ccbd837bb6e

    • SHA512

      46e30dc7b59b7c3f44bd870a95263cb2d1fae276ab9ca220dd83b8872bc9de362940c44033650443c97ebd5f8d0ceba192af3ad818a696a8ff97f0895200e10a

    • SSDEEP

      12288:gSO4asKoAeMYbjVGLRa5+79GpAhBDA4VGMeGE+tRaZn/+YgIr6gO/aXcz3GTMNIG:9eoAeMOjVG9m2O+Np8eche8R9oKEd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks