General

  • Target

    987654345678SK.exe

  • Size

    243KB

  • Sample

    230522-ke97kshg7y

  • MD5

    c7dd9baa8edc8390acae1409db63a5f0

  • SHA1

    0549b987268a417a3cded255c691c1b06d9bcab6

  • SHA256

    f471bb104b1ae05e5e786e5f17577f5a199d36b2e39dc6b9c4a5ead9e54960d8

  • SHA512

    ce7c87f8fbc1965b7df16e9137a78d947413892f45d963da7047145f596f7d6db9f214379251f80af159db5e86c793b3680ed1c6e934d843c0b13d92da53a5f3

  • SSDEEP

    3072:+R/CFu2f+gKbye2cV6mpb5uck0X19PPF1wabhGM6ejQQbThzf6XC+f6OK+oXH:QsL+Ny2V6mpb5Rp9gEkM6vQshK+oX

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      987654345678SK.exe

    • Size

      243KB

    • MD5

      c7dd9baa8edc8390acae1409db63a5f0

    • SHA1

      0549b987268a417a3cded255c691c1b06d9bcab6

    • SHA256

      f471bb104b1ae05e5e786e5f17577f5a199d36b2e39dc6b9c4a5ead9e54960d8

    • SHA512

      ce7c87f8fbc1965b7df16e9137a78d947413892f45d963da7047145f596f7d6db9f214379251f80af159db5e86c793b3680ed1c6e934d843c0b13d92da53a5f3

    • SSDEEP

      3072:+R/CFu2f+gKbye2cV6mpb5uck0X19PPF1wabhGM6ejQQbThzf6XC+f6OK+oXH:QsL+Ny2V6mpb5Rp9gEkM6vQshK+oX

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks