General

  • Target

    1640-7-0x00000000005D0000-0x00000000005F6000-memory.dmp

  • Size

    152KB

  • Sample

    231126-vfpblsaf41

  • MD5

    369c323d3d5591b365a2bd815a1a3c24

  • SHA1

    1798d3c24595ec470334e926d2aca5873ebea768

  • SHA256

    305b67c72fe0bb678b81522394c14e6ddcb503aa0a63f0832cb42c002fed811a

  • SHA512

    a44e1cd1a1f90946ea4a9ba615a3a07449b7fba7ac23690888d64d4a56ad907657d2e30f6ca7941ada31f695def3838c9ca2958d3d6e3273730152a675c482c6

  • SSDEEP

    3072:Q03rDOrifRWIdzUTEuJrHItmdTGMpSX6bSwLzRsQ0wvxTumJgbY:tfRWUzUnyDX6bqmCb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      1640-7-0x00000000005D0000-0x00000000005F6000-memory.dmp

    • Size

      152KB

    • MD5

      369c323d3d5591b365a2bd815a1a3c24

    • SHA1

      1798d3c24595ec470334e926d2aca5873ebea768

    • SHA256

      305b67c72fe0bb678b81522394c14e6ddcb503aa0a63f0832cb42c002fed811a

    • SHA512

      a44e1cd1a1f90946ea4a9ba615a3a07449b7fba7ac23690888d64d4a56ad907657d2e30f6ca7941ada31f695def3838c9ca2958d3d6e3273730152a675c482c6

    • SSDEEP

      3072:Q03rDOrifRWIdzUTEuJrHItmdTGMpSX6bSwLzRsQ0wvxTumJgbY:tfRWUzUnyDX6bqmCb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks