General

  • Target

    da16aec5cb0b5b984a32e4ca45a32a73266ca3e6148aedee8758de7f0ba66df3.zip

  • Size

    496KB

  • Sample

    231022-vkzm5sdb97

  • MD5

    78b2e7f468c087ca78a70ff25e62800e

  • SHA1

    afbf68fa667941052398332e799d80da2c1de01a

  • SHA256

    d95dda472dd69ca8fb9ba01826bdcecfdc29b4360c6aa7ccb6607d765b200659

  • SHA512

    468cb0277ac05dad2dca1259356985254f6dae76f9416a708c4dad2511faecffb0b52789d3d38dacbc815f99accd02c12ecf276531d78fe6ce3111f45beac58a

  • SSDEEP

    12288:VSimISflr2jc3Y/zFMqbPeuj+ohFi9+gDkJmMRAY7GH6Ib4K/le5n:bf82woXdj+t+gERAY7G6K4OYn

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      da16aec5cb0b5b984a32e4ca45a32a73266ca3e6148aedee8758de7f0ba66df3.exe

    • Size

      531KB

    • MD5

      1547a83da18ae73b5570ced53296b7d3

    • SHA1

      d24f9c3a567142783e20869bfbb44e8e84aa657d

    • SHA256

      da16aec5cb0b5b984a32e4ca45a32a73266ca3e6148aedee8758de7f0ba66df3

    • SHA512

      30c930d5caf6f0c839966694966cd2591e4f7a7a742c0fecc68e8077d25b57acb5620b0fbb6e1217c85d4f4f3840e574f6d80da9cfc298f91b78720eb88c160d

    • SSDEEP

      12288:K60q1vjJGGna1WWgQ94bMYDLpzSr+MtL0NVS1eLVj/tWjFB1:T0q1LJ1na1teIYHpmr+igPooNMD1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks