General

  • Target

    39ae9cdb090b0983c5577e095e489236

  • Size

    244KB

  • Sample

    231231-rqadnadecr

  • MD5

    39ae9cdb090b0983c5577e095e489236

  • SHA1

    40f1308a87fca711b6aef961dfb8fe753dd20960

  • SHA256

    0bbc06390e3dfc9e44bda66fbc1e08ef13cf3d0b0b49ae4e72305a840a352511

  • SHA512

    e3daed03b0360e96ba3745844bdb91555a881e2dfc28a4d2bc372a6a9cc4953297cac2d48b6f887f1124161e594d4ada65dfd07102abf64e2931214161d4a721

  • SSDEEP

    6144:z+CO3hsaqyAzPb/NOAEs6PWmMhbvTAlC37o6o:ExNtA/NVEVPWmMh9Lo6o

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      39ae9cdb090b0983c5577e095e489236

    • Size

      244KB

    • MD5

      39ae9cdb090b0983c5577e095e489236

    • SHA1

      40f1308a87fca711b6aef961dfb8fe753dd20960

    • SHA256

      0bbc06390e3dfc9e44bda66fbc1e08ef13cf3d0b0b49ae4e72305a840a352511

    • SHA512

      e3daed03b0360e96ba3745844bdb91555a881e2dfc28a4d2bc372a6a9cc4953297cac2d48b6f887f1124161e594d4ada65dfd07102abf64e2931214161d4a721

    • SSDEEP

      6144:z+CO3hsaqyAzPb/NOAEs6PWmMhbvTAlC37o6o:ExNtA/NVEVPWmMh9Lo6o

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks