General

  • Target

    f19c34054199717dac72c386ddddd0a0.bin

  • Size

    504KB

  • Sample

    230401-chwvcsgf31

  • MD5

    6f7cccb2cb2f32bd9c83c3aa38cd9396

  • SHA1

    73713b8e1f8ae542e7810d4a925605ff26a706a0

  • SHA256

    e3cdc7d48c21ccd251079855920989134bc7702a0fd9bdd2b2e6a24321f16a92

  • SHA512

    74683554dee3d493b69f182808832a76aedbdfda177bf8197b779edf0b195ea8be0ef12981410330b81e372a5966582ad66c7805151a719f4b07e2bcd68364eb

  • SSDEEP

    12288:yyf1+Ac9KyQekvJS5VCRpvHtxXT1wK59eLs60aE+u66tAkXYYo:yyPBRvJiV8pvfXTB+s61q66tA+Y3

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      351c8d8b35c127e116e63eae43fb4aa24ceec9d4ca93f67e1b94dc7d271f205a.exe

    • Size

      617KB

    • MD5

      f19c34054199717dac72c386ddddd0a0

    • SHA1

      f198077ba4ee5c000bfdb43b340b0910001d8939

    • SHA256

      351c8d8b35c127e116e63eae43fb4aa24ceec9d4ca93f67e1b94dc7d271f205a

    • SHA512

      66b3ff900c9e10b01aae999cf14d37849c8611b9f82b1481cc75393e3eec21bed1d769a7f97d1f7a212547456db74313d29dbfa959203e05cb510e2e5aceac51

    • SSDEEP

      12288:2dMQ0TbAYnB3J7cHgE1UUrMYPW/Cve/FucofQUimOMt+:27IbAYnBpcHd1Um1PXmtu75imX

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks