General

  • Target

    tmp

  • Size

    924KB

  • Sample

    230322-z2qtsadd3s

  • MD5

    fe05605a8065764a5ec8aba32db6e697

  • SHA1

    389a4e7840726f7a47573e3939c608739b68f103

  • SHA256

    8d13301deb6ab177620d38718648a0efb851eabf26b708a388abab7b7daf41d1

  • SHA512

    9929532e7bfe8094d9bc902423e2d9ba2e8cab5e739fcd920eed3ea82c12e769776fbf75ba8ba0fdc4830152963ba0be0ba32b2876d39edbed1ba481bda9d39b

  • SSDEEP

    6144:qNr+2+AQu6rl4UE0rZU6dGwcJPv+sLQwMRe1ryQV5RZBxRwZZ0PDNQsQRjGgBUPv:qNrZ+oelflhIh5TxSHBUPyF

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      tmp

    • Size

      924KB

    • MD5

      fe05605a8065764a5ec8aba32db6e697

    • SHA1

      389a4e7840726f7a47573e3939c608739b68f103

    • SHA256

      8d13301deb6ab177620d38718648a0efb851eabf26b708a388abab7b7daf41d1

    • SHA512

      9929532e7bfe8094d9bc902423e2d9ba2e8cab5e739fcd920eed3ea82c12e769776fbf75ba8ba0fdc4830152963ba0be0ba32b2876d39edbed1ba481bda9d39b

    • SSDEEP

      6144:qNr+2+AQu6rl4UE0rZU6dGwcJPv+sLQwMRe1ryQV5RZBxRwZZ0PDNQsQRjGgBUPv:qNrZ+oelflhIh5TxSHBUPyF

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks