General

  • Target

    d0f2b9c05f739d86e1b664ff41c9e2bf2333b6c5d17253ee90f77c5f2d61052c.exe

  • Size

    483KB

  • Sample

    240911-n6dt8sygjp

  • MD5

    9801bfd3db1dd7d6d16bdb1fb822ddba

  • SHA1

    7bab08a4e87cbff5c3e25505eaf5a15948d0d482

  • SHA256

    d0f2b9c05f739d86e1b664ff41c9e2bf2333b6c5d17253ee90f77c5f2d61052c

  • SHA512

    46005c9b35daf0283a42ed3c980e2afe1c533602f2db2b09c393707ca89f0225d3fe1637ded395e147b17b5ecc8f2d9f52d2c0256e7f8f1f4e3d816363fc599d

  • SSDEEP

    12288:y8G1KBs849ttS9HC+sKIuGwOYGk7ZovH5UPA:2YBy9vS9HfsKI7nS7Zs5UY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      d0f2b9c05f739d86e1b664ff41c9e2bf2333b6c5d17253ee90f77c5f2d61052c.exe

    • Size

      483KB

    • MD5

      9801bfd3db1dd7d6d16bdb1fb822ddba

    • SHA1

      7bab08a4e87cbff5c3e25505eaf5a15948d0d482

    • SHA256

      d0f2b9c05f739d86e1b664ff41c9e2bf2333b6c5d17253ee90f77c5f2d61052c

    • SHA512

      46005c9b35daf0283a42ed3c980e2afe1c533602f2db2b09c393707ca89f0225d3fe1637ded395e147b17b5ecc8f2d9f52d2c0256e7f8f1f4e3d816363fc599d

    • SSDEEP

      12288:y8G1KBs849ttS9HC+sKIuGwOYGk7ZovH5UPA:2YBy9vS9HfsKI7nS7Zs5UY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks