General

  • Target

    NEAS.e3a38aeddcd6a3526af9adc0778d9c329cacbd2792969ca56556634609170207exe_JC.exe

  • Size

    853KB

  • Sample

    231019-ysxejacg48

  • MD5

    26da835f1bc9b3389a2f21460a923da4

  • SHA1

    160ad3ca38776ebbf41324305ea4aa38a52f7147

  • SHA256

    e3a38aeddcd6a3526af9adc0778d9c329cacbd2792969ca56556634609170207

  • SHA512

    88417f839eb4809533ab30b8eee6da68be2aa2806f06ba62bba7a408345655f36b0e284322360f2409fed059de466238b5eaa48d1f62db44bde69cacaa381f3f

  • SSDEEP

    12288:VY2fYXXL4VLICxUUINZQlXOxMV04WLSqS/Qrcpr:3jxUUIXQIxI97tJ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      NEAS.e3a38aeddcd6a3526af9adc0778d9c329cacbd2792969ca56556634609170207exe_JC.exe

    • Size

      853KB

    • MD5

      26da835f1bc9b3389a2f21460a923da4

    • SHA1

      160ad3ca38776ebbf41324305ea4aa38a52f7147

    • SHA256

      e3a38aeddcd6a3526af9adc0778d9c329cacbd2792969ca56556634609170207

    • SHA512

      88417f839eb4809533ab30b8eee6da68be2aa2806f06ba62bba7a408345655f36b0e284322360f2409fed059de466238b5eaa48d1f62db44bde69cacaa381f3f

    • SSDEEP

      12288:VY2fYXXL4VLICxUUINZQlXOxMV04WLSqS/Qrcpr:3jxUUIXQIxI97tJ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks