General

  • Target

    c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b.exe

  • Size

    599KB

  • Sample

    240508-qdgrjagd94

  • MD5

    e0f288a7108a42a623bfeb29b27a3643

  • SHA1

    1d5b4a130ed109335b4ae939fd9756afc2a161b2

  • SHA256

    c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b

  • SHA512

    b0f0c97c7e1c6450b112fe6794a99a54ad0ac7c8a746edd214d6ce8e52fb625b75e892f30d96548c04e169f786656cbf1d52cf9571275b92dc13666923e199c4

  • SSDEEP

    12288:taXiAEfDBDNm/UMNCZ2COqjKJHVKGgtCZ7jc1ESm5:aRE7BxUbNZqKZVtf7jWm

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://scratchdreams.tk

Targets

    • Target

      c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b.exe

    • Size

      599KB

    • MD5

      e0f288a7108a42a623bfeb29b27a3643

    • SHA1

      1d5b4a130ed109335b4ae939fd9756afc2a161b2

    • SHA256

      c68376bcbfd140e682ba3b0f7535af83a9653b63f090718ce028a9a65514959b

    • SHA512

      b0f0c97c7e1c6450b112fe6794a99a54ad0ac7c8a746edd214d6ce8e52fb625b75e892f30d96548c04e169f786656cbf1d52cf9571275b92dc13666923e199c4

    • SSDEEP

      12288:taXiAEfDBDNm/UMNCZ2COqjKJHVKGgtCZ7jc1ESm5:aRE7BxUbNZqKZVtf7jWm

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks