General

  • Target

    clip_image001.exe

  • Size

    411KB

  • Sample

    230323-gtrf8sdh78

  • MD5

    0600fd383dfdc1c13eec78c11c9a848d

  • SHA1

    f26e1ed9f1e4a926e613de202318652cdba076ec

  • SHA256

    47e8a43a5dfcefe4d6850764bb413ffeab6724be3a37620853b686c9fb23db34

  • SHA512

    f5b3492f4e0694f541f08b2979f2e7c68ddb399df7fafdf29bed08e7fc11ed2fe87dc2b803658ea40c424026b38b373ac859d25cd8a116924417a0adb74ae244

  • SSDEEP

    6144:8BeMoZqMFv+k0Q8It5gUqJ3PrYx4ePqAeHdKLAdXKEPHihu:ioZqMpB0Qwn3seeuKLAvf0u

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      clip_image001.exe

    • Size

      411KB

    • MD5

      0600fd383dfdc1c13eec78c11c9a848d

    • SHA1

      f26e1ed9f1e4a926e613de202318652cdba076ec

    • SHA256

      47e8a43a5dfcefe4d6850764bb413ffeab6724be3a37620853b686c9fb23db34

    • SHA512

      f5b3492f4e0694f541f08b2979f2e7c68ddb399df7fafdf29bed08e7fc11ed2fe87dc2b803658ea40c424026b38b373ac859d25cd8a116924417a0adb74ae244

    • SSDEEP

      6144:8BeMoZqMFv+k0Q8It5gUqJ3PrYx4ePqAeHdKLAdXKEPHihu:ioZqMpB0Qwn3seeuKLAvf0u

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks