General

  • Target

    1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6.zip

  • Size

    542KB

  • Sample

    231119-z2vsqsbf26

  • MD5

    f8f9711eb260ee174cf2d8ee2833052a

  • SHA1

    a4f6d4667334f63562c0494902fdedc6ab1a75c8

  • SHA256

    bca369ab3c26d9fee70f3ff85e13135934e96a866bb8d4564bc3d3017ba7ddcf

  • SHA512

    3c232152c83c00e3e88733d8004e488c20e85d4409b2d5f9e5f916f114f3af720451562f97f0a4e3e8f193695c6e4c68f59738b0f7ddd5b1ecfa80e3f5e164e8

  • SSDEEP

    12288:8oRUW0i8rHgwgBPkBYc2NajZSzjZy4VzAB/GY6JeYh4JoDTod+amVSGrB5HPZv:8o5yD9g6CnNISZyeAJGYYeYhxod+fVS6

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6.exe

    • Size

      616KB

    • MD5

      77521173381682b5a1deb286bce27bf4

    • SHA1

      2ad56680cb0c821b18c269c63f4eeeb770140800

    • SHA256

      1de5d25aecac6b32b06fe38549376748d098fd43abb5c23f73ee9ddb780080d6

    • SHA512

      5366df45795f970f1b17113caf65c1e677b44da372cc85159fc4de4d8d32a08798aa4120cac956014c75fb71fce53ddfe8e76075b66c5f24e50a8f4a12254e53

    • SSDEEP

      12288:h36N/bxyuAFnSz0cYMSE7a45naENKqIfPbY9QPNTURftb2pLuxQ:h3gqSznYMP5MbskYVapuQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks