General

  • Target

    NEAS.NEASNEASe31e7a2c5a956f2e513351e779fd6ea064f2aceec566a3e9b6ac0d3a3e639ee0exeexeexe_JC.exe

  • Size

    125KB

  • Sample

    231018-xmqjcsbc82

  • MD5

    e37a6c6b05dc6b19b62b1d6a2e824063

  • SHA1

    7cf01b7b9d216ebbb4e0309dc90408b67d1987b4

  • SHA256

    e31e7a2c5a956f2e513351e779fd6ea064f2aceec566a3e9b6ac0d3a3e639ee0

  • SHA512

    1e5bf1ebd6f8a6799ed67738895c7b3f52c3f828a8bb7f9ec02550c29d9c46427bb3129150f09c98a29df828f7d725de38dcf2b4321b1d374fd8e6ffadab3038

  • SSDEEP

    3072:vybcQZIBwtWp6ocm6Db7vGEqwB7xogbY:lQuhR6DbLGQxxb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      NEAS.NEASNEASe31e7a2c5a956f2e513351e779fd6ea064f2aceec566a3e9b6ac0d3a3e639ee0exeexeexe_JC.exe

    • Size

      125KB

    • MD5

      e37a6c6b05dc6b19b62b1d6a2e824063

    • SHA1

      7cf01b7b9d216ebbb4e0309dc90408b67d1987b4

    • SHA256

      e31e7a2c5a956f2e513351e779fd6ea064f2aceec566a3e9b6ac0d3a3e639ee0

    • SHA512

      1e5bf1ebd6f8a6799ed67738895c7b3f52c3f828a8bb7f9ec02550c29d9c46427bb3129150f09c98a29df828f7d725de38dcf2b4321b1d374fd8e6ffadab3038

    • SSDEEP

      3072:vybcQZIBwtWp6ocm6Db7vGEqwB7xogbY:lQuhR6DbLGQxxb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks