General

  • Target

    9f061ed14a6be403487e1d5d9f57c1c7.bin

  • Size

    442KB

  • Sample

    231105-c81agabh34

  • MD5

    500ba67f1b89397c417a360ceb7d428c

  • SHA1

    f5a954de789ad3dca2c79e1044fae03363ee055d

  • SHA256

    92f582920e73361b9cc4467e3aacc1c4159b6b337ac7d07f9e085968c2af1be0

  • SHA512

    0d69bd82556e3f7851507df8cb15b569ecff1020ad45d6053a4471649ebf09dd8453f1f29d25e9ea3278c02c98a7b88ecf17b337be9de7dea222fa95a20beca6

  • SSDEEP

    12288:r5Vq8D+1kL6f3v21C29VIZPORek/To1eoJD8fhpTt:FYBv2o2gZPy/U1eQQZpTt

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      8518ccc749c3934b1ce840e708d97659b02f1ba717205789d869dbb49103f5ce.exe

    • Size

      1.1MB

    • MD5

      9f061ed14a6be403487e1d5d9f57c1c7

    • SHA1

      14b8bb53f104da83ac047a2133b3c16b1c417ae6

    • SHA256

      8518ccc749c3934b1ce840e708d97659b02f1ba717205789d869dbb49103f5ce

    • SHA512

      9af07665a41a5babc582a8b45f02068e7f198ed93edf32c2721448b84fc92c6ee2b1844694079a3d335e5222df27666e4b6ae5f9b6e2725923ad92f8ab94e9e2

    • SSDEEP

      24576:ktfo6PTetbba1C/Ll3HoyhLLGmkB/YAuseX7KvO1YAuJMi+sPV3GykDfMNVzCOgk:Uo0etbba1C/Ll3HxHRpAuserKvpAuJMO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks