General

  • Target

    a1cd95ad76ee5bb8b1d74991098b314ed39685e91af1aec151e24a474cadedb6.exe

  • Size

    823KB

  • Sample

    231201-wz42vaeg87

  • MD5

    0aca7012eb566b0ca43fc1d6e0f99c71

  • SHA1

    ad070ea6cd6d65650d2733364af95e2135fbe930

  • SHA256

    a1cd95ad76ee5bb8b1d74991098b314ed39685e91af1aec151e24a474cadedb6

  • SHA512

    ec24212cea60ba880bfaa46c85af0ff03dc5d434b092d22bffaa9d6df02333344ff1225dbd24daf329e6bfbfda4e4a0c3c4f280e6227818e06c9c7ab9113222b

  • SSDEEP

    12288:nDwMaylvcV2SguL5NE6jD/62iNopSid8j+wWhS1FIreCftNta3VSpmMBO2oXdeEj:DktD/612Yo8j+wcSPOeGdpmM40ENp

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      a1cd95ad76ee5bb8b1d74991098b314ed39685e91af1aec151e24a474cadedb6.exe

    • Size

      823KB

    • MD5

      0aca7012eb566b0ca43fc1d6e0f99c71

    • SHA1

      ad070ea6cd6d65650d2733364af95e2135fbe930

    • SHA256

      a1cd95ad76ee5bb8b1d74991098b314ed39685e91af1aec151e24a474cadedb6

    • SHA512

      ec24212cea60ba880bfaa46c85af0ff03dc5d434b092d22bffaa9d6df02333344ff1225dbd24daf329e6bfbfda4e4a0c3c4f280e6227818e06c9c7ab9113222b

    • SSDEEP

      12288:nDwMaylvcV2SguL5NE6jD/62iNopSid8j+wWhS1FIreCftNta3VSpmMBO2oXdeEj:DktD/612Yo8j+wcSPOeGdpmM40ENp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks