General

  • Target

    13102023_1824_12102023_PV-20231807.z

  • Size

    476KB

  • Sample

    231013-mfdacage3v

  • MD5

    cbd18a14c5cdbf9ebc4dbe4a6d774df5

  • SHA1

    2e415f7c1996b6d2997a45340af79c637c490eea

  • SHA256

    2a1eb7cc8cf2432ec9a2c12542ee011ad60f692a4936c8c7facee7fad7f8b01c

  • SHA512

    02b81331728c97722dca71f8e5759a5ea50b8f8f36330076b9ee5d538e01b73df0cdab2ce8308c6924dcf8de968f6e738e385aa8afce02c8e2731b6795cab43a

  • SSDEEP

    6144:TgmLzy8ysdsxGkyBSA1n6txE8bMBXjaUvGMCiNaPIWhFTmLGEjbDe3qw6UKeqtw4:MrUkWSAt6w8b4za/M9Ahdmr/yVqhXom

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PV-20231807.exe

    • Size

      508KB

    • MD5

      5d55280d5e6d3b17ac87cdb46098ec00

    • SHA1

      bdd7eb75311685a840f9b24c3cedb12fc0c8d69f

    • SHA256

      2c70aee0f3f97fc0c454253425ce94833d2612757c435dc180d2ebf2eff4610a

    • SHA512

      776ed91a6e2b67bf8cc91a1c48e0789ea114bd359e7bb0db16771709f5231d49dcb566aa2eae940e92b8f3dc2c37d475a058006c6bd83cc224489340325e7c72

    • SSDEEP

      12288:kYCvoZWKR0+4xwoKX5PyPXkntMo7gh+y3ljL:hCvoZ3x4GokyPetMosh+qjL

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks