General

  • Target

    2236-6-0x00000000003F0000-0x0000000000414000-memory.dmp

  • Size

    144KB

  • Sample

    231120-k1gr6aff7v

  • MD5

    94765ae43c715ccfe88e04e40067b784

  • SHA1

    ae4d330374e946f5d6606b70b83fef9ba6ca732e

  • SHA256

    2d41c6919b1de545b775daf217439b9272a6da5c76488ae53cf2f63b836948f5

  • SHA512

    ec021e41191a9b8ee8dd99e23496d1ba7172b3981875ed9ac0a969080d5801865c23e0bb76a1b042facde29c25c501e896a5c2e8a441af57082c77d9cfc0e878

  • SSDEEP

    3072:RyryR6uag4XrhnMgUmGoIb7GBwBgxRgbY:lXCJUmGhb0xqb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      2236-6-0x00000000003F0000-0x0000000000414000-memory.dmp

    • Size

      144KB

    • MD5

      94765ae43c715ccfe88e04e40067b784

    • SHA1

      ae4d330374e946f5d6606b70b83fef9ba6ca732e

    • SHA256

      2d41c6919b1de545b775daf217439b9272a6da5c76488ae53cf2f63b836948f5

    • SHA512

      ec021e41191a9b8ee8dd99e23496d1ba7172b3981875ed9ac0a969080d5801865c23e0bb76a1b042facde29c25c501e896a5c2e8a441af57082c77d9cfc0e878

    • SSDEEP

      3072:RyryR6uag4XrhnMgUmGoIb7GBwBgxRgbY:lXCJUmGhb0xqb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks