General

  • Target

    d515411b9a3c0d9fb13b9c6a928a7fd0.exe

  • Size

    934KB

  • Sample

    241007-af6wfateqj

  • MD5

    d515411b9a3c0d9fb13b9c6a928a7fd0

  • SHA1

    f940a7302ac76567c15efb1a15d789b42224aac3

  • SHA256

    7b2fcffe77e320517c511f5a3700d8545712475aeb4dc04088537fa8456fec77

  • SHA512

    447a5ab235672a2d067e5792260aa5b978720f8d67ac80bd875e74d7032cb496e3b0463f3c3870bd87d975cddf7f750df35a9ea7aa8aa65f1bd1590d3305c9d6

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLyf5/wh0ZMx6he17l2N:f3v+7/5QLyho+ZK6he17+

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      d515411b9a3c0d9fb13b9c6a928a7fd0.exe

    • Size

      934KB

    • MD5

      d515411b9a3c0d9fb13b9c6a928a7fd0

    • SHA1

      f940a7302ac76567c15efb1a15d789b42224aac3

    • SHA256

      7b2fcffe77e320517c511f5a3700d8545712475aeb4dc04088537fa8456fec77

    • SHA512

      447a5ab235672a2d067e5792260aa5b978720f8d67ac80bd875e74d7032cb496e3b0463f3c3870bd87d975cddf7f750df35a9ea7aa8aa65f1bd1590d3305c9d6

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLyf5/wh0ZMx6he17l2N:f3v+7/5QLyho+ZK6he17+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks