General

  • Target

    4ea950fc894a846d1a68931b149c2802

  • Size

    342KB

  • Sample

    231226-djxzgscegq

  • MD5

    4ea950fc894a846d1a68931b149c2802

  • SHA1

    88f7997ad608ecda14e0af5594d89d418ec38808

  • SHA256

    e135385603e2df5429b326841d4755f9edc6bcd86450f04d284dc45ea621c56c

  • SHA512

    950c7a7d85f2af7b48909934454e8b8ff5f05f3c5543261fc70f0361c37c5d48af973c0e1eacc1e466ab1ced12b4a61bfbc690870895715d0c89bb8ff1b49b1b

  • SSDEEP

    6144:CZGh9F7ZmKBcgqh3SBuvXUW64ROVlYpvvnEHrCZyp/zpXW5mq6ExGNElnzGWwXFf:CZG1dmKO0SE+OnY5sHrCZ2zZW4qrxPlC

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      4ea950fc894a846d1a68931b149c2802

    • Size

      342KB

    • MD5

      4ea950fc894a846d1a68931b149c2802

    • SHA1

      88f7997ad608ecda14e0af5594d89d418ec38808

    • SHA256

      e135385603e2df5429b326841d4755f9edc6bcd86450f04d284dc45ea621c56c

    • SHA512

      950c7a7d85f2af7b48909934454e8b8ff5f05f3c5543261fc70f0361c37c5d48af973c0e1eacc1e466ab1ced12b4a61bfbc690870895715d0c89bb8ff1b49b1b

    • SSDEEP

      6144:CZGh9F7ZmKBcgqh3SBuvXUW64ROVlYpvvnEHrCZyp/zpXW5mq6ExGNElnzGWwXFf:CZG1dmKO0SE+OnY5sHrCZ2zZW4qrxPlC

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks