General

  • Target

    beb3bf20287cc5427b4a6717a68107ba6d789f43ca49d1b6b6887c102e79ae5b.exe

  • Size

    1007KB

  • Sample

    241009-pkgvfayeme

  • MD5

    4d14ec1a87ad56df26f46a04af09a582

  • SHA1

    dcd8d83c385676560e75acf702961777ad39605b

  • SHA256

    beb3bf20287cc5427b4a6717a68107ba6d789f43ca49d1b6b6887c102e79ae5b

  • SHA512

    f169342b37ae4506a44aecb97115199cc2ed2ae3aabb8285fc7d5ce028c698ccc97c20e8c2bb49f51f3438b4d7de9855f4bc8f71db81d715ac45c3971a9a8424

  • SSDEEP

    24576:pRmJkcoQricOIQxiZY1iaajn4q+8M9lFwwqkkYDday0:mJZoQrbTFZY1iain4q+B9lOl3

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      beb3bf20287cc5427b4a6717a68107ba6d789f43ca49d1b6b6887c102e79ae5b.exe

    • Size

      1007KB

    • MD5

      4d14ec1a87ad56df26f46a04af09a582

    • SHA1

      dcd8d83c385676560e75acf702961777ad39605b

    • SHA256

      beb3bf20287cc5427b4a6717a68107ba6d789f43ca49d1b6b6887c102e79ae5b

    • SHA512

      f169342b37ae4506a44aecb97115199cc2ed2ae3aabb8285fc7d5ce028c698ccc97c20e8c2bb49f51f3438b4d7de9855f4bc8f71db81d715ac45c3971a9a8424

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaajn4q+8M9lFwwqkkYDday0:mJZoQrbTFZY1iain4q+B9lOl3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks