General

  • Target

    c91949910f477e57ea7f4e38b81f98dee405da84502dabdd39ff9bc621db5df9

  • Size

    1.0MB

  • Sample

    240403-rn1g3aec2y

  • MD5

    89761f3fa995c9344721da2f4ba79ff5

  • SHA1

    4b310755f57dc212cc9739511c15e89f44cf7a14

  • SHA256

    c91949910f477e57ea7f4e38b81f98dee405da84502dabdd39ff9bc621db5df9

  • SHA512

    a119adde67a547ee086a9a3570f9833b8fa75bac7874e82bf34f78e29255ce654a6e45105b7323885cfe6cfed6781c039cda24eb052051abd58fb34ab9b52253

  • SSDEEP

    12288:zhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcbNPCV68Lua13KVsrOQW60ZtV:5RmJkcoQricOIQxiZY1WNPk2F2rBjmB3

Malware Config

Extracted

Family

snakekeylogger

C2

https://scratchdreams.tk

Targets

    • Target

      c91949910f477e57ea7f4e38b81f98dee405da84502dabdd39ff9bc621db5df9

    • Size

      1.0MB

    • MD5

      89761f3fa995c9344721da2f4ba79ff5

    • SHA1

      4b310755f57dc212cc9739511c15e89f44cf7a14

    • SHA256

      c91949910f477e57ea7f4e38b81f98dee405da84502dabdd39ff9bc621db5df9

    • SHA512

      a119adde67a547ee086a9a3570f9833b8fa75bac7874e82bf34f78e29255ce654a6e45105b7323885cfe6cfed6781c039cda24eb052051abd58fb34ab9b52253

    • SSDEEP

      12288:zhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcbNPCV68Lua13KVsrOQW60ZtV:5RmJkcoQricOIQxiZY1WNPk2F2rBjmB3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks