General

  • Target

    c31c83c9e23f1b9a0d3713b99447efad083e2043bb0ba78e9edf2bf5a4fc3290.exe

  • Size

    1.0MB

  • Sample

    231127-vr5gzaaf49

  • MD5

    fc35e8f4e686768edb5ae42d7f1eddda

  • SHA1

    f402d39a62d3ef28a685d728216b863844187e74

  • SHA256

    c31c83c9e23f1b9a0d3713b99447efad083e2043bb0ba78e9edf2bf5a4fc3290

  • SHA512

    e7af4870516f8c316781b2db6979de21a3d7c4e9a4366da2ca34ee7b21784fbd97e02b0cc3a1e014cba7fc3feb826d1e6107f7ac3cb90e40885ceec18dc87dd8

  • SSDEEP

    12288:O2PSzMJr5dqNVhQSGqMysoE3oYz+SRU0rH6PF+5JQyagV:NPSzMT0Nzs2t0H9OgV

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      c31c83c9e23f1b9a0d3713b99447efad083e2043bb0ba78e9edf2bf5a4fc3290.exe

    • Size

      1.0MB

    • MD5

      fc35e8f4e686768edb5ae42d7f1eddda

    • SHA1

      f402d39a62d3ef28a685d728216b863844187e74

    • SHA256

      c31c83c9e23f1b9a0d3713b99447efad083e2043bb0ba78e9edf2bf5a4fc3290

    • SHA512

      e7af4870516f8c316781b2db6979de21a3d7c4e9a4366da2ca34ee7b21784fbd97e02b0cc3a1e014cba7fc3feb826d1e6107f7ac3cb90e40885ceec18dc87dd8

    • SSDEEP

      12288:O2PSzMJr5dqNVhQSGqMysoE3oYz+SRU0rH6PF+5JQyagV:NPSzMT0Nzs2t0H9OgV

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks