General

  • Target

    19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2.exe

  • Size

    70.0MB

  • Sample

    240906-hj5fsasanl

  • MD5

    1761d1544f193851882c5f59868a1d58

  • SHA1

    15a21dc05cc4fbd55afc06d8ccdbd9ef9906c169

  • SHA256

    19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2

  • SHA512

    af35c9b09c1a9c67ccd71ed59c2957559331d9cdd5fdbf12208dfcd852b7624819e9a9fd44e511c82c019b6afaf163dd3f9b4bd1f7a9f865f59db57b6c7174c1

  • SSDEEP

    24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8aEctGLJ9+wW:5TvC/MTQYxsWR7aEctc9J

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2.exe

    • Size

      70.0MB

    • MD5

      1761d1544f193851882c5f59868a1d58

    • SHA1

      15a21dc05cc4fbd55afc06d8ccdbd9ef9906c169

    • SHA256

      19ee9c2057e10fb993daf27d4492a362dfc5f89269225e077caee0ce1f719fd2

    • SHA512

      af35c9b09c1a9c67ccd71ed59c2957559331d9cdd5fdbf12208dfcd852b7624819e9a9fd44e511c82c019b6afaf163dd3f9b4bd1f7a9f865f59db57b6c7174c1

    • SSDEEP

      24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8aEctGLJ9+wW:5TvC/MTQYxsWR7aEctc9J

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks