General

  • Target

    695640703f43e6250704c8a10d01604e799b1cdeb4c4340ae5bf2a25e2c291f0.exe

  • Size

    484KB

  • Sample

    240906-brz3psycmn

  • MD5

    4f317faf94f46f6ea6bdbdc2a5e2b929

  • SHA1

    36a41461d36205bbc7245dd194d76a6001de9411

  • SHA256

    695640703f43e6250704c8a10d01604e799b1cdeb4c4340ae5bf2a25e2c291f0

  • SHA512

    7d246dfd84b9a7d7683a9377210609bb6c684ae48f4370c8c8507c6905af69bde0c6c1405253746d22d20056f121a1f638446f7c54462ec81af42515f9b57be7

  • SSDEEP

    12288:y8G1KBsGhcbWFP7a4+iMg2WMN5IAk3w0/Vw5ZovH5UP3:2YBfhcbMza4+guZZs5UP

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      695640703f43e6250704c8a10d01604e799b1cdeb4c4340ae5bf2a25e2c291f0.exe

    • Size

      484KB

    • MD5

      4f317faf94f46f6ea6bdbdc2a5e2b929

    • SHA1

      36a41461d36205bbc7245dd194d76a6001de9411

    • SHA256

      695640703f43e6250704c8a10d01604e799b1cdeb4c4340ae5bf2a25e2c291f0

    • SHA512

      7d246dfd84b9a7d7683a9377210609bb6c684ae48f4370c8c8507c6905af69bde0c6c1405253746d22d20056f121a1f638446f7c54462ec81af42515f9b57be7

    • SSDEEP

      12288:y8G1KBsGhcbWFP7a4+iMg2WMN5IAk3w0/Vw5ZovH5UP3:2YBfhcbMza4+guZZs5UP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks