General

  • Target

    3ebbd8420e5203a6c4a7c22f4d530ed2af31cd2638b7fd026f498bc1e55da16f_JC.exe

  • Size

    548KB

  • Sample

    231003-rjrz5adc75

  • MD5

    ca3117a128871f374d105270374603bf

  • SHA1

    5b864a01ce233333f57b23ae22b20c950d8539a0

  • SHA256

    3ebbd8420e5203a6c4a7c22f4d530ed2af31cd2638b7fd026f498bc1e55da16f

  • SHA512

    9372df560ef939c5a82015a816fe48eab59ce82f24d1c3353aaf3f0cd08fc36bb6b4d19c4372eaabe42a4576a28aabb03cc3a711bf23c21f14db0588c1811850

  • SSDEEP

    12288:MpmNumB0appprS0ecmpiG7qZZO/AMqDqx34ARunGM4Wd29p:Uty3Dr0KtMqqxPzMB0

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      3ebbd8420e5203a6c4a7c22f4d530ed2af31cd2638b7fd026f498bc1e55da16f_JC.exe

    • Size

      548KB

    • MD5

      ca3117a128871f374d105270374603bf

    • SHA1

      5b864a01ce233333f57b23ae22b20c950d8539a0

    • SHA256

      3ebbd8420e5203a6c4a7c22f4d530ed2af31cd2638b7fd026f498bc1e55da16f

    • SHA512

      9372df560ef939c5a82015a816fe48eab59ce82f24d1c3353aaf3f0cd08fc36bb6b4d19c4372eaabe42a4576a28aabb03cc3a711bf23c21f14db0588c1811850

    • SSDEEP

      12288:MpmNumB0appprS0ecmpiG7qZZO/AMqDqx34ARunGM4Wd29p:Uty3Dr0KtMqqxPzMB0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks