General

  • Target

    3330ef05d7ff5aef9105a3d7c48bc83d16d9255c79d7b613202ee841581a4b95

  • Size

    615KB

  • Sample

    231123-j5chkagf62

  • MD5

    87e1fdd2ef2c2c901cbf9fdef0346b95

  • SHA1

    58d19b60420bbfde303518deb489b9c19b5b30e1

  • SHA256

    3330ef05d7ff5aef9105a3d7c48bc83d16d9255c79d7b613202ee841581a4b95

  • SHA512

    a9f00628128a25375f3851f55e747b9590f5378074a0100ca876f15939cbfe2a82a38c84a2a4ccab25f53fce65ff19a4ce1c72dc17825f49517fef000c6f0d53

  • SSDEEP

    12288:WxLcJf0Gdq5W8ZZrVEw5o5Ahbjx64TEib0TbL3FQeQ:WtcJZQbxTXgGbCFu

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Quotation No. 001515 & Quotation No. 001518.exe

    • Size

      1.0MB

    • MD5

      92ea59584143492a9997cb726c50cc2f

    • SHA1

      e921858b54293bf976396bfe4ab73fd5dfe6db1d

    • SHA256

      09f3ffc4cf39c48f84b8eac7c29a49f9c1c576fd7c804a18374ee0e93d69bc37

    • SHA512

      289d9e48cad3c994fd66ea9563e6563b8f897f92fe283c234e307b336fea757de19201dbafa8a1f843657891514a53dbae15d25e91d72c7aa2b6091687510f16

    • SSDEEP

      12288:fFNlzMJr5jdij0pkTiS4+cN1283rsnBACiTt28yNa3yagV:tNlzMTjdu0MiS4+YTABAC4t3MafgV

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks