General

  • Target

    db37fbffacc10cdcb13d1d29625d1016.exe

  • Size

    597KB

  • Sample

    231103-jbs88afh84

  • MD5

    db37fbffacc10cdcb13d1d29625d1016

  • SHA1

    f8dc77a852edd28dce27bd7f9fae80abde1e67fa

  • SHA256

    7b80af0eb67ef03700b1aa95e8e25ec0b9f4debd4dc0f9276eac46f9120c6e73

  • SHA512

    3b283d541fdd923fb969a86a5b985bbb4db8c0d25e9cd8a3e49391fec9bb608e52e2a3dffb58822d078e9365c4cb1ed13e274cbb2141547cc9c4174a329e6212

  • SSDEEP

    12288:q8z69yqLlg14DV+G4Q7gaTcWsWpLokQjc7VfE5udp:L6XiyV+G4tEZ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      db37fbffacc10cdcb13d1d29625d1016.exe

    • Size

      597KB

    • MD5

      db37fbffacc10cdcb13d1d29625d1016

    • SHA1

      f8dc77a852edd28dce27bd7f9fae80abde1e67fa

    • SHA256

      7b80af0eb67ef03700b1aa95e8e25ec0b9f4debd4dc0f9276eac46f9120c6e73

    • SHA512

      3b283d541fdd923fb969a86a5b985bbb4db8c0d25e9cd8a3e49391fec9bb608e52e2a3dffb58822d078e9365c4cb1ed13e274cbb2141547cc9c4174a329e6212

    • SSDEEP

      12288:q8z69yqLlg14DV+G4Q7gaTcWsWpLokQjc7VfE5udp:L6XiyV+G4tEZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks