General

  • Target

    a78cd90c7038b5fbeb10b972492b762a.exe

  • Size

    144KB

  • Sample

    231012-h9wassga23

  • MD5

    a78cd90c7038b5fbeb10b972492b762a

  • SHA1

    d9a1d4b511c824971d91ab7ebfe85688254caedc

  • SHA256

    b82242cf60b9f23d227f5dda48fd1e959dbc0a0bd06bccb279ff3531783873ec

  • SHA512

    6b6ef7d05ece99b7adbe3d2bcd53d3061280dcbd5e2c3d21590145b8963447727e7957f07d7613fbbb0b0e28a3bc3902fb2b49e2a79930bda92937435f07c637

  • SSDEEP

    1536:ukBjbbGvhhbKCGM3bwa+vBUFMlY6vE9xTUl/1kvzMFZkamc5Eib/zJx3YPeZpiOu:7BjbKqPM3bivETitb7J+WbwBgxmgbY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      a78cd90c7038b5fbeb10b972492b762a.exe

    • Size

      144KB

    • MD5

      a78cd90c7038b5fbeb10b972492b762a

    • SHA1

      d9a1d4b511c824971d91ab7ebfe85688254caedc

    • SHA256

      b82242cf60b9f23d227f5dda48fd1e959dbc0a0bd06bccb279ff3531783873ec

    • SHA512

      6b6ef7d05ece99b7adbe3d2bcd53d3061280dcbd5e2c3d21590145b8963447727e7957f07d7613fbbb0b0e28a3bc3902fb2b49e2a79930bda92937435f07c637

    • SSDEEP

      1536:ukBjbbGvhhbKCGM3bwa+vBUFMlY6vE9xTUl/1kvzMFZkamc5Eib/zJx3YPeZpiOu:7BjbKqPM3bivETitb7J+WbwBgxmgbY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks