General

  • Target

    NEAS.6db2ebc71c9485ff4eddbfd643006f38b5f8d502cfb6056aee688b849424d898z_JC.rar

  • Size

    511KB

  • Sample

    231019-w1tmhaab8t

  • MD5

    c01ecc0341820d7d335ea0f0c72c40f2

  • SHA1

    36a1833cd60e6266473925166146c7efeacc550b

  • SHA256

    6db2ebc71c9485ff4eddbfd643006f38b5f8d502cfb6056aee688b849424d898

  • SHA512

    e9695cfe0fe2df5eedcf8ae311ac802516ab1254ba63536e6bde23aaa9944261ff893e94e170fd1172168ed8000c835057626450ab88cad39b234878f705b684

  • SSDEEP

    12288:uEHV1wHNr4oUvopO6inBkSScPy+Y9Lld1uk7dh+tkUXzSLFL:PVyHU9rPujd1X2kUXzSLd

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      08A347B6-6FB3-4B5E-9A49-9EC1E49DF8F1.pdf.exe

    • Size

      853KB

    • MD5

      26da835f1bc9b3389a2f21460a923da4

    • SHA1

      160ad3ca38776ebbf41324305ea4aa38a52f7147

    • SHA256

      e3a38aeddcd6a3526af9adc0778d9c329cacbd2792969ca56556634609170207

    • SHA512

      88417f839eb4809533ab30b8eee6da68be2aa2806f06ba62bba7a408345655f36b0e284322360f2409fed059de466238b5eaa48d1f62db44bde69cacaa381f3f

    • SSDEEP

      12288:VY2fYXXL4VLICxUUINZQlXOxMV04WLSqS/Qrcpr:3jxUUIXQIxI97tJ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks