General

  • Target

    Wire_01987012.exe

  • Size

    964KB

  • Sample

    240924-hxnp7ayekc

  • MD5

    ddf895aac213b394e4bf8be023f68dcd

  • SHA1

    826ce15cfa6857adf191540b2b843fa97aa4cce0

  • SHA256

    eb7b6182f2f6ccd5b150c810e5eaf94b7e22a638e6968e566d96f8f5f1ed85b1

  • SHA512

    399bb4ecd0e3aee265eca048ee3a530edfb48948d46e6e5d11f9b93696d79e36d72d44d72c9d526b8d552af66cfe98dd48291b047ee0bfc1136f7c0113027889

  • SSDEEP

    12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCPE8hz/isTvzvrwCuhlA0:uRmJkcoQricOIQxiZY1iaCTLbvkRH+Na

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Wire_01987012.exe

    • Size

      964KB

    • MD5

      ddf895aac213b394e4bf8be023f68dcd

    • SHA1

      826ce15cfa6857adf191540b2b843fa97aa4cce0

    • SHA256

      eb7b6182f2f6ccd5b150c810e5eaf94b7e22a638e6968e566d96f8f5f1ed85b1

    • SHA512

      399bb4ecd0e3aee265eca048ee3a530edfb48948d46e6e5d11f9b93696d79e36d72d44d72c9d526b8d552af66cfe98dd48291b047ee0bfc1136f7c0113027889

    • SSDEEP

      12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCPE8hz/isTvzvrwCuhlA0:uRmJkcoQricOIQxiZY1iaCTLbvkRH+Na

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks