General

  • Target

    78a6dd64fa777ed37c0ffeae2cdda73789dfb56cd8552083e87dbf563f6039a8exe.exe

  • Size

    518KB

  • Sample

    231205-wtvafsdg5v

  • MD5

    c39926da378faad0c950ea349890c989

  • SHA1

    f904d0f53e30591a7064c6b2d0602e2831db3ee1

  • SHA256

    78a6dd64fa777ed37c0ffeae2cdda73789dfb56cd8552083e87dbf563f6039a8

  • SHA512

    df0b8ef8076b7cc0c53978601d04689d7df4474a5f96f3134ad058dc8faf10c65cc26f8ea25cfe8a06cc0ef7dc8cfab735e9aaef4b515fea976299b10df5d22c

  • SSDEEP

    6144:MC245gVpoTWvYExGZXGRWYiDApqMP9nknrUuOuOtkUGamdJ5wVAWzLla2JXPyTbr:M145+po2dx03gpvAOuOtFmWzE2Y7ZF

Malware Config

Targets

    • Target

      78a6dd64fa777ed37c0ffeae2cdda73789dfb56cd8552083e87dbf563f6039a8exe.exe

    • Size

      518KB

    • MD5

      c39926da378faad0c950ea349890c989

    • SHA1

      f904d0f53e30591a7064c6b2d0602e2831db3ee1

    • SHA256

      78a6dd64fa777ed37c0ffeae2cdda73789dfb56cd8552083e87dbf563f6039a8

    • SHA512

      df0b8ef8076b7cc0c53978601d04689d7df4474a5f96f3134ad058dc8faf10c65cc26f8ea25cfe8a06cc0ef7dc8cfab735e9aaef4b515fea976299b10df5d22c

    • SSDEEP

      6144:MC245gVpoTWvYExGZXGRWYiDApqMP9nknrUuOuOtkUGamdJ5wVAWzLla2JXPyTbr:M145+po2dx03gpvAOuOtFmWzE2Y7ZF

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks