General

  • Target

    2876-7-0x0000000000910000-0x0000000000936000-memory.dmp

  • Size

    152KB

  • Sample

    231126-vdqrnaaf3x

  • MD5

    8373bfe53ffe5894b4b2baeac9c2a630

  • SHA1

    28c21fc3ae0f8d285e99246cd5f280e0d0c435c6

  • SHA256

    ce377d08ff81abacda97c5d0781463a09c254cadc937c55e62f695a0f462c89a

  • SHA512

    7e2fa771cf1ab34bf2adbda516d9d272b6856e52cf528dc2b1e9491f48be32d259e9300321b46dcde5edf61e2b05ea1aa90226155696491abd50073116e9516f

  • SSDEEP

    3072:IMorDWr82YOI1wEfeUCBFv7Vm1TadeVbSAZ0sQbwvxTum5gbY:U2YOcwEfzRRVbwmyb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      2876-7-0x0000000000910000-0x0000000000936000-memory.dmp

    • Size

      152KB

    • MD5

      8373bfe53ffe5894b4b2baeac9c2a630

    • SHA1

      28c21fc3ae0f8d285e99246cd5f280e0d0c435c6

    • SHA256

      ce377d08ff81abacda97c5d0781463a09c254cadc937c55e62f695a0f462c89a

    • SHA512

      7e2fa771cf1ab34bf2adbda516d9d272b6856e52cf528dc2b1e9491f48be32d259e9300321b46dcde5edf61e2b05ea1aa90226155696491abd50073116e9516f

    • SSDEEP

      3072:IMorDWr82YOI1wEfeUCBFv7Vm1TadeVbSAZ0sQbwvxTum5gbY:U2YOcwEfzRRVbwmyb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks