General

  • Target

    a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14.exe

  • Size

    1.0MB

  • Sample

    240914-b6eejszhpn

  • MD5

    6b8ffeb500dd8a10b3a3f437efb9714c

  • SHA1

    0bf183baf160e6753b38ce48f2ae8b8cf32653d0

  • SHA256

    a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14

  • SHA512

    998ffbf313d2c4d20bfac39eb69427e19c795b72a199b430a3db2b5834dac935be3e9627adc4e607ade531c5ebfbf9d39d4fba7a63b42f53ba69d9f339eaa2b3

  • SSDEEP

    24576:1tb20pkaCqT5TBWgNQ7a9depk/7diNU36A:mVg5tQ7a9482G5

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14.exe

    • Size

      1.0MB

    • MD5

      6b8ffeb500dd8a10b3a3f437efb9714c

    • SHA1

      0bf183baf160e6753b38ce48f2ae8b8cf32653d0

    • SHA256

      a3c5b99f9435e0c297203819b58e8f0b87dcfdf42271b71e429f86a7efd36a14

    • SHA512

      998ffbf313d2c4d20bfac39eb69427e19c795b72a199b430a3db2b5834dac935be3e9627adc4e607ade531c5ebfbf9d39d4fba7a63b42f53ba69d9f339eaa2b3

    • SSDEEP

      24576:1tb20pkaCqT5TBWgNQ7a9depk/7diNU36A:mVg5tQ7a9482G5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks