General

  • Target

    7bb4de5fdd6463b06e23e9952b4cac66

  • Size

    1.2MB

  • Sample

    240128-a2yryshder

  • MD5

    7bb4de5fdd6463b06e23e9952b4cac66

  • SHA1

    ef0827a00c4ef703062057f03694a28b3f00a747

  • SHA256

    14a2316ce5e82e513a479c1f8f6a42afbbd9a8e6c8e319b4ac85a2364ec1794e

  • SHA512

    ca02fd6f04abca3312aee7ed6d18cf1bd309466ce42ca9ce0635c381a831b88e0bcf51bd2b38760632a9ee9749f746f86c398282608d9c786fa9ca3eba682ff2

  • SSDEEP

    24576:5ma876DOzfx8Dgyfx8DgTuQoJdUtSrh3rBY6NwDZ/SL:V876C58Dgy58Dg6EMry6CZq

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      7bb4de5fdd6463b06e23e9952b4cac66

    • Size

      1.2MB

    • MD5

      7bb4de5fdd6463b06e23e9952b4cac66

    • SHA1

      ef0827a00c4ef703062057f03694a28b3f00a747

    • SHA256

      14a2316ce5e82e513a479c1f8f6a42afbbd9a8e6c8e319b4ac85a2364ec1794e

    • SHA512

      ca02fd6f04abca3312aee7ed6d18cf1bd309466ce42ca9ce0635c381a831b88e0bcf51bd2b38760632a9ee9749f746f86c398282608d9c786fa9ca3eba682ff2

    • SSDEEP

      24576:5ma876DOzfx8Dgyfx8DgTuQoJdUtSrh3rBY6NwDZ/SL:V876C58Dgy58Dg6EMry6CZq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks