General

  • Target

    3a439e3638fe4b48f0b76f6844c6e9a3

  • Size

    580KB

  • Sample

    231225-ywnlssffal

  • MD5

    3a439e3638fe4b48f0b76f6844c6e9a3

  • SHA1

    6c45d83f3d62cbd7af2bbf0e72aa134a6cc1509d

  • SHA256

    8c5308faa016ec4a047a72c04fccdd6e49cece16947fc000491d947d102fdd45

  • SHA512

    865dcafd88a016117eb6817f338058e5a6e55b3db1ebbe1e9b21f4a9c4cd9a9347e684f4458cd10490c83a76a1bedd27ffbf6c9fd2ae4b8e917afc4ec20f2051

  • SSDEEP

    12288:3Ee9XyLSWv0NP2sg4hiBrv2Sq0WuknrhbptL3ekqjn4Or6X20:Ss1pxSkbH

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      3a439e3638fe4b48f0b76f6844c6e9a3

    • Size

      580KB

    • MD5

      3a439e3638fe4b48f0b76f6844c6e9a3

    • SHA1

      6c45d83f3d62cbd7af2bbf0e72aa134a6cc1509d

    • SHA256

      8c5308faa016ec4a047a72c04fccdd6e49cece16947fc000491d947d102fdd45

    • SHA512

      865dcafd88a016117eb6817f338058e5a6e55b3db1ebbe1e9b21f4a9c4cd9a9347e684f4458cd10490c83a76a1bedd27ffbf6c9fd2ae4b8e917afc4ec20f2051

    • SSDEEP

      12288:3Ee9XyLSWv0NP2sg4hiBrv2Sq0WuknrhbptL3ekqjn4Or6X20:Ss1pxSkbH

    • Detect ZGRat V1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks