General

  • Target

    6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8

  • Size

    1.1MB

  • Sample

    240920-zfmv1axala

  • MD5

    a89a0e42fc2e1f33abf93e44cad2073b

  • SHA1

    a64345371fe0ad2c6885087329f5cf5a98af189a

  • SHA256

    6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8

  • SHA512

    92e2979fa352488e8fae7b9ba650656d6af3c220ee3199c93163e6b15c249cbe9db1cfb1331698b47705412ec7dc91e6c92cab47a7428a14c7592336f5cd1961

  • SSDEEP

    24576:oQDZIaJExFtl+ZLbcsR9Y4dOPAGFoCKNTlkejfrg4SVQGSakmJ:oQDZvJE7t4I29JuAGFoC0RkejfMcGSaH

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8

    • Size

      1.1MB

    • MD5

      a89a0e42fc2e1f33abf93e44cad2073b

    • SHA1

      a64345371fe0ad2c6885087329f5cf5a98af189a

    • SHA256

      6b737a6aef7bd8b764b2c3e8abfdf9ab4741fb23ef232a906fb4658b1db6d7d8

    • SHA512

      92e2979fa352488e8fae7b9ba650656d6af3c220ee3199c93163e6b15c249cbe9db1cfb1331698b47705412ec7dc91e6c92cab47a7428a14c7592336f5cd1961

    • SSDEEP

      24576:oQDZIaJExFtl+ZLbcsR9Y4dOPAGFoCKNTlkejfrg4SVQGSakmJ:oQDZvJE7t4I29JuAGFoC0RkejfMcGSaH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks