General

  • Target

    26092024_0021_25092024_Ref_0160_0782.7z

  • Size

    95KB

  • Sample

    240926-anszjsygpg

  • MD5

    e8944990e1fb006e293a4b59e40f67d0

  • SHA1

    58110730422ddf85426cfaf3380d59daf2b69cf2

  • SHA256

    5efd6cde8394ec8c874ab0321cfafa605499f972d7c320fd02dad95276e0668d

  • SHA512

    e0ae03a2dc07c306c960f6a035a42618d96c2faf2b6ce6d0d0f175ff66de340d750a7b46304ffb6d0fb5571920231e804c1231056632c9d92fdf510caed07f4c

  • SSDEEP

    1536:jqtN7INSNGIACmX3jMYiRKkTFKpWzjyyMYhHNQTqasKuwAPDNn8nZfsEZ365jQlZ:S7khfXjHpkTYonyShtQ2nKzun6x8bCj

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Ref_0160_0782.exe

    • Size

      102KB

    • MD5

      ea6421e2c475a88353aff4aef00dfd3a

    • SHA1

      055bcef3e98729d5515ba1e34d30977b28fcba58

    • SHA256

      cc353b50dbbf45b7c931885450e2a1033135b0b59daf5720b5a98f2941a5038e

    • SHA512

      f515e5a587951840dd1f76003804f4edc4f0379d370c9e372e21d811bdc07e935ea593cf5e046f1d6c70d78a409fc5b4a5832dc84ad9fa90c84af35138770c91

    • SSDEEP

      3072:Q8ISVIPM8mI8yrQeT9YFDaNUTTYR0iyW88Sv7KU/s:Q8lVIPM8R8yXT9saNOTYR588Se9

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks