General

  • Target

    PV-20231809.exe

  • Size

    560KB

  • Sample

    231012-tyslbabc9t

  • MD5

    3dd1d164f3fe43d7f198c5ffda6da9aa

  • SHA1

    1bcb335b680f6dd54fef399aac96b0af55f86af7

  • SHA256

    9f064193ee006ae05b49119c2be37e4c9f8021d112041012ede0b8630d6f1a52

  • SHA512

    d1f7098264e8d2562e180acb40936c4587c9a938affb574e8b09a3abb2638ed665e6906b23b60c25e234198f9202a6a4bfd96dc2e87c890f76a49cedf2b05b40

  • SSDEEP

    12288:aYwAfDuHOXXWNcxClvzEmSbMaLdv5yX7ZG6IqP9fgJ:aYwgxeICl/OBL+XZvPhS

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PV-20231809.exe

    • Size

      560KB

    • MD5

      3dd1d164f3fe43d7f198c5ffda6da9aa

    • SHA1

      1bcb335b680f6dd54fef399aac96b0af55f86af7

    • SHA256

      9f064193ee006ae05b49119c2be37e4c9f8021d112041012ede0b8630d6f1a52

    • SHA512

      d1f7098264e8d2562e180acb40936c4587c9a938affb574e8b09a3abb2638ed665e6906b23b60c25e234198f9202a6a4bfd96dc2e87c890f76a49cedf2b05b40

    • SSDEEP

      12288:aYwAfDuHOXXWNcxClvzEmSbMaLdv5yX7ZG6IqP9fgJ:aYwgxeICl/OBL+XZvPhS

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks