General

  • Target

    93afb66389491a73cad457f5e22dea24.exe

  • Size

    1.2MB

  • Sample

    230325-q5v38sch75

  • MD5

    93afb66389491a73cad457f5e22dea24

  • SHA1

    f97577cfd4a0285c92ee5d0871fd6fd65e71bcba

  • SHA256

    9950b95b9ec431f1a93d12d2dbf4995c308f39b70742d09850b4a5995680391e

  • SHA512

    a2fe55d63e3f21a84042f9c13495dc638e1307650d5f3aab60167f4088f044b4be069a2ec38be75fc3e984fca7e8fd0ce319bd85979dfb3decfc64b8d122461a

  • SSDEEP

    24576:T+25JMO59SCGhHthR/vNifb8+Ro0niV6/6ywO:T+yUthRnNYjRT9/6fO

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      93afb66389491a73cad457f5e22dea24.exe

    • Size

      1.2MB

    • MD5

      93afb66389491a73cad457f5e22dea24

    • SHA1

      f97577cfd4a0285c92ee5d0871fd6fd65e71bcba

    • SHA256

      9950b95b9ec431f1a93d12d2dbf4995c308f39b70742d09850b4a5995680391e

    • SHA512

      a2fe55d63e3f21a84042f9c13495dc638e1307650d5f3aab60167f4088f044b4be069a2ec38be75fc3e984fca7e8fd0ce319bd85979dfb3decfc64b8d122461a

    • SSDEEP

      24576:T+25JMO59SCGhHthR/vNifb8+Ro0niV6/6ywO:T+yUthRnNYjRT9/6fO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks