General

  • Target

    ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286.exe.zip

  • Size

    320KB

  • Sample

    231002-n1r5nsbg48

  • MD5

    187f66b47fef7c368900bd38e497768f

  • SHA1

    4caa1116242532d12d7763bbb05edf0355ff4691

  • SHA256

    95d3d4b51a244e544f09faaeb3dd8654bd568238ecba7f4198013064c2e01a82

  • SHA512

    0bb4a47f3a349d47a38ba04853e6cdbf738853fcf064710ada19b592a8d8f77d6780925e6b52b3401333d7c3cbc2b7e155fdcdfeb8293225c445b74377a18e56

  • SSDEEP

    6144:Nwqbgj8i3KOEfH2MBLor73vCIt/16XJcW8TNccbYbJpTtjfyZDzdBpn:yqbvi3JEf2MBLe7ltcZMTe9p8ZHjpn

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.product-secured.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    575K5(MaZro2575K5(MaZro2

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.product-secured.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    575K5(MaZro2575K5(MaZro2

Targets

    • Target

      ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286.exe

    • Size

      682KB

    • MD5

      31c0fb555469b0836b447b2e71c8fd74

    • SHA1

      85a52ac681c856927403114207455b1cc42d38a0

    • SHA256

      ff777a5e6a54f56d5452624ec6f0cd6938ba286ce648176efeec46fcceed5286

    • SHA512

      7d549ef196dbb3701c4c4b83ef6a7b7e455ebc45d00037e399f5cf44a3909bd12ca21aee5bc07dbd96a5df2a50b39004e342840e2527349eba9cbb5e6f08d473

    • SSDEEP

      12288:361tZZr9L7kX0F1CEgkEXQwko3b2VvRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRs:361tZL3kY0EgnXQOL

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks