General

  • Target

    5e437cb4a253b31df25cd406127f1d6be2e1e6eadbe1bc90a8438c674d6c3240_JC.exe

  • Size

    548KB

  • Sample

    231004-whn93adf2w

  • MD5

    fe87c4e3c089316d0222db4965fde5dd

  • SHA1

    0a66f5477620ecef41dd14322359a468c7ceba3c

  • SHA256

    5e437cb4a253b31df25cd406127f1d6be2e1e6eadbe1bc90a8438c674d6c3240

  • SHA512

    f0822c3781d8e3a1e1e02ca3e204f92016c883d2d327ff782e6a0ad3e8b654b0b3d247a8285cab520702fbd5c7c36e15288f518f9d2269f9eeb2fd7f01f4d8c6

  • SSDEEP

    12288:4nexQNumB0ldv1XWG/dm5EniOqJt7MAhx7NpckoiOLIZ7c:Vfykdv1XRF9nSM+jCU1c

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      5e437cb4a253b31df25cd406127f1d6be2e1e6eadbe1bc90a8438c674d6c3240_JC.exe

    • Size

      548KB

    • MD5

      fe87c4e3c089316d0222db4965fde5dd

    • SHA1

      0a66f5477620ecef41dd14322359a468c7ceba3c

    • SHA256

      5e437cb4a253b31df25cd406127f1d6be2e1e6eadbe1bc90a8438c674d6c3240

    • SHA512

      f0822c3781d8e3a1e1e02ca3e204f92016c883d2d327ff782e6a0ad3e8b654b0b3d247a8285cab520702fbd5c7c36e15288f518f9d2269f9eeb2fd7f01f4d8c6

    • SSDEEP

      12288:4nexQNumB0ldv1XWG/dm5EniOqJt7MAhx7NpckoiOLIZ7c:Vfykdv1XRF9nSM+jCU1c

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks