General

  • Target

    a71def2e25368c12469a158add24786ce11a2b6b89afd81006cc283edb604e9c

  • Size

    615KB

  • Sample

    231123-cdrpvafe28

  • MD5

    e391897dc66445e6bfddc73898c4a99d

  • SHA1

    1155aad83d426c3e80c7cd46dd72621340bedcc3

  • SHA256

    a71def2e25368c12469a158add24786ce11a2b6b89afd81006cc283edb604e9c

  • SHA512

    1e38fc30f0c4f33e583c6961d9744c1f5ad113f3fe806dc562c57cb9cd4ce5a9e0e939b57dd6d1375501cf95de8d948162d0012492a2d4a75051486aea047e84

  • SSDEEP

    12288:ixLcJf0Gdq5W8ZZrVEw5o5Ahbjx64TEib0TbL3FQeQ:itcJZQbxTXgGbCFu

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      product List.exe

    • Size

      1.0MB

    • MD5

      92ea59584143492a9997cb726c50cc2f

    • SHA1

      e921858b54293bf976396bfe4ab73fd5dfe6db1d

    • SHA256

      09f3ffc4cf39c48f84b8eac7c29a49f9c1c576fd7c804a18374ee0e93d69bc37

    • SHA512

      289d9e48cad3c994fd66ea9563e6563b8f897f92fe283c234e307b336fea757de19201dbafa8a1f843657891514a53dbae15d25e91d72c7aa2b6091687510f16

    • SSDEEP

      12288:fFNlzMJr5jdij0pkTiS4+cN1283rsnBACiTt28yNa3yagV:tNlzMTjdu0MiS4+YTABAC4t3MafgV

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks