General

  • Target

    (ES2309-015).exe

  • Size

    596KB

  • Sample

    231012-pcg58she6t

  • MD5

    cdfe23a08e0b9673367a3379bed3e92e

  • SHA1

    e91914745caff7dac32d6659548068785e8b613f

  • SHA256

    774848bbb254f80a0771e51ab42402c9f69c34593f875dfe436506089c595505

  • SHA512

    fad52aa899c7fc86e76fe656fb15dba3297135f4f3cc7fc1132759765cac4847bc2feb1c0ec0663e6538bba8b855c97f8ac1672483d4712fd1cf83e3775119a3

  • SSDEEP

    12288:8wFmyBfJw1UAADCXTFdhV97yFtQRl8Yr8bvste+a3ekfJ:L9BwluCXTFdhPktQP8YrYkUj3/B

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      (ES2309-015).exe

    • Size

      596KB

    • MD5

      cdfe23a08e0b9673367a3379bed3e92e

    • SHA1

      e91914745caff7dac32d6659548068785e8b613f

    • SHA256

      774848bbb254f80a0771e51ab42402c9f69c34593f875dfe436506089c595505

    • SHA512

      fad52aa899c7fc86e76fe656fb15dba3297135f4f3cc7fc1132759765cac4847bc2feb1c0ec0663e6538bba8b855c97f8ac1672483d4712fd1cf83e3775119a3

    • SSDEEP

      12288:8wFmyBfJw1UAADCXTFdhV97yFtQRl8Yr8bvste+a3ekfJ:L9BwluCXTFdhPktQP8YrYkUj3/B

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks