General

  • Target

    a0ecae9fd2e8d8bd180a078c5dd9b378.exe

  • Size

    784KB

  • Sample

    230328-v9fassdh7s

  • MD5

    a0ecae9fd2e8d8bd180a078c5dd9b378

  • SHA1

    1d78da116b35a20b4efb3d2d2335904d3edea31d

  • SHA256

    549dd9bedf40c44d43f4c7fabd72feab510a787f291d6c6a090f13152fd66ad8

  • SHA512

    1819342eb958b08d7e4f9228e7e2070130b4299b09818781ebe018f724336d298e304d99aef11fb5cdda181f01a9c23172cb57e845e958517c722097b954e9b4

  • SSDEEP

    12288:QAcsqYTcPDVCJPMJJNNJQlxyEkI+6XHuf1VYdl8WQKOg8yZ2ah:ppugRMPNekH63GEl8WHOg8yZ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      a0ecae9fd2e8d8bd180a078c5dd9b378.exe

    • Size

      784KB

    • MD5

      a0ecae9fd2e8d8bd180a078c5dd9b378

    • SHA1

      1d78da116b35a20b4efb3d2d2335904d3edea31d

    • SHA256

      549dd9bedf40c44d43f4c7fabd72feab510a787f291d6c6a090f13152fd66ad8

    • SHA512

      1819342eb958b08d7e4f9228e7e2070130b4299b09818781ebe018f724336d298e304d99aef11fb5cdda181f01a9c23172cb57e845e958517c722097b954e9b4

    • SSDEEP

      12288:QAcsqYTcPDVCJPMJJNNJQlxyEkI+6XHuf1VYdl8WQKOg8yZ2ah:ppugRMPNekH63GEl8WHOg8yZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks