General

  • Target

    74c687d2cbb8e93481530eba3ec627b5d9902901797e67fce58a949b8b50491c_JC.exe

  • Size

    548KB

  • Sample

    231004-wl6nhsff53

  • MD5

    7bbadb55076fd343bed53fb839524c92

  • SHA1

    4bb956cda4ca089cbfdc80f913fb7a2cc5bcc45d

  • SHA256

    74c687d2cbb8e93481530eba3ec627b5d9902901797e67fce58a949b8b50491c

  • SHA512

    d806d10c1df5e988d2a832bee1dc8a2cc22fb196e0abf471e2ceac8ca6dbe797e5b9e197867bcf579a47ed0fbdc6e8781e7bb0250ca1710ffbb95e3c8e1d4130

  • SSDEEP

    12288:EneUsNumB0lMBIlD1WtyDROlTJNR0trAeuq28cZs9I11vg/5:sjyOD1Wt2ON5KLcZsyYh

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      74c687d2cbb8e93481530eba3ec627b5d9902901797e67fce58a949b8b50491c_JC.exe

    • Size

      548KB

    • MD5

      7bbadb55076fd343bed53fb839524c92

    • SHA1

      4bb956cda4ca089cbfdc80f913fb7a2cc5bcc45d

    • SHA256

      74c687d2cbb8e93481530eba3ec627b5d9902901797e67fce58a949b8b50491c

    • SHA512

      d806d10c1df5e988d2a832bee1dc8a2cc22fb196e0abf471e2ceac8ca6dbe797e5b9e197867bcf579a47ed0fbdc6e8781e7bb0250ca1710ffbb95e3c8e1d4130

    • SSDEEP

      12288:EneUsNumB0lMBIlD1WtyDROlTJNR0trAeuq28cZs9I11vg/5:sjyOD1Wt2ON5KLcZsyYh

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks