General

  • Target

    a4114193d5bf253ec70f5397ed0ff250

  • Size

    589KB

  • Sample

    240225-r9kczaeb34

  • MD5

    a4114193d5bf253ec70f5397ed0ff250

  • SHA1

    55f96e5bce7558b8bcadfa773702e0b2b555ed96

  • SHA256

    99f59aa11f2055047ffa00acfbbe3acb09d7dd47d715eb879ba9cdb2c6241bb4

  • SHA512

    cdcbb0c56c6aa73a333f2b4995a50129c041edf734067ada5f5001a61a7a261ee3f50df5eee52d45291078d2b8dd2775052cf7443ea9ff757be8f444f2fe9de0

  • SSDEEP

    12288:Un5UTADhOHeQ3+1yaxquTb/RJVqJ1hBxTWQ4QVMs8qGLBjxrJW:bL5QFqVDfmI

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      a4114193d5bf253ec70f5397ed0ff250

    • Size

      589KB

    • MD5

      a4114193d5bf253ec70f5397ed0ff250

    • SHA1

      55f96e5bce7558b8bcadfa773702e0b2b555ed96

    • SHA256

      99f59aa11f2055047ffa00acfbbe3acb09d7dd47d715eb879ba9cdb2c6241bb4

    • SHA512

      cdcbb0c56c6aa73a333f2b4995a50129c041edf734067ada5f5001a61a7a261ee3f50df5eee52d45291078d2b8dd2775052cf7443ea9ff757be8f444f2fe9de0

    • SSDEEP

      12288:Un5UTADhOHeQ3+1yaxquTb/RJVqJ1hBxTWQ4QVMs8qGLBjxrJW:bL5QFqVDfmI

    • Detect ZGRat V1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks