General

  • Target

    3a860e1257711b90548081d22657597b.exe

  • Size

    128KB

  • Sample

    230215-qxf94sbh83

  • MD5

    3a860e1257711b90548081d22657597b

  • SHA1

    14f4a6d83d8f494f41fb4303042486dd30f30d79

  • SHA256

    71998ac92ffce7c5d3544631b25229fc33d5a79d76f47ec5dcf996e1e8389cd8

  • SHA512

    cb4d9f97a48de25fdd0fe4b3d8b6f3a02e2cb3dcb56ba553c0d23ece0e076b199648d801103aa869471086b958d645d82698265e3dedaa4d097050fe2db9a077

  • SSDEEP

    3072:ecNEOaa89WpAGshT46b8Vn/dRkwBVj8oFbY:+dOn6bkX8Mb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      3a860e1257711b90548081d22657597b.exe

    • Size

      128KB

    • MD5

      3a860e1257711b90548081d22657597b

    • SHA1

      14f4a6d83d8f494f41fb4303042486dd30f30d79

    • SHA256

      71998ac92ffce7c5d3544631b25229fc33d5a79d76f47ec5dcf996e1e8389cd8

    • SHA512

      cb4d9f97a48de25fdd0fe4b3d8b6f3a02e2cb3dcb56ba553c0d23ece0e076b199648d801103aa869471086b958d645d82698265e3dedaa4d097050fe2db9a077

    • SSDEEP

      3072:ecNEOaa89WpAGshT46b8Vn/dRkwBVj8oFbY:+dOn6bkX8Mb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks