General

  • Target

    1496-66-0x00000000002D0000-0x00000000002F6000-memory.dmp

  • Size

    152KB

  • Sample

    230215-s2e9qace68

  • MD5

    8f70c72b7bcb3bad658e51c4ab4ccca4

  • SHA1

    3e438a0fb7b17d1180ffb831ff9a66015ee7ef73

  • SHA256

    a3bc6492c962bb40d8c9f93f2ef1f18642efdc07da134724394eb9fe978b2ffd

  • SHA512

    02e76bb87bc402fc737b2608ffd3c5d0cf0774d68f1134ddaf0c2beec2995fc88812b93fa6fc25ddafa0d5d1ace3f20ffb75d654bff5b6ac478ce16e48b1315c

  • SSDEEP

    1536:rAgzEJRCRjTZ13uJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFTSIKLVF/yab/UF:rAgAEzoHj/LDdLgBbb8BFbwBj2OFbY

Malware Config

Targets

    • Target

      1496-66-0x00000000002D0000-0x00000000002F6000-memory.dmp

    • Size

      152KB

    • MD5

      8f70c72b7bcb3bad658e51c4ab4ccca4

    • SHA1

      3e438a0fb7b17d1180ffb831ff9a66015ee7ef73

    • SHA256

      a3bc6492c962bb40d8c9f93f2ef1f18642efdc07da134724394eb9fe978b2ffd

    • SHA512

      02e76bb87bc402fc737b2608ffd3c5d0cf0774d68f1134ddaf0c2beec2995fc88812b93fa6fc25ddafa0d5d1ace3f20ffb75d654bff5b6ac478ce16e48b1315c

    • SSDEEP

      1536:rAgzEJRCRjTZ13uJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFTSIKLVF/yab/UF:rAgAEzoHj/LDdLgBbb8BFbwBj2OFbY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks