General

  • Target

    2bb55a42ae8b9d98ed1e5cb6b11b4b9eab5c0a89ab9309c003ccb7a6372f2965.exe

  • Size

    1.1MB

  • Sample

    241113-my46satndl

  • MD5

    600aca0c8ca3eb6ab67adb08ed9c68b0

  • SHA1

    c937e74fa33e667094a28348899e9859ed8fd237

  • SHA256

    2bb55a42ae8b9d98ed1e5cb6b11b4b9eab5c0a89ab9309c003ccb7a6372f2965

  • SHA512

    ed7f0a8dfe9b3405e3617628c149b8944fb5b906e60ffd320daa4d478eef02a6ea31881a1388fde61219022ded13e864c147df6df8402b9e630951ab47663f7a

  • SSDEEP

    24576:mRmJkcoQricOIQxiZY1iaI9tlvQEWYnfHYHfHboZ:jJZoQrbTFZY1iaI/N4WvYHfHboZ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      2bb55a42ae8b9d98ed1e5cb6b11b4b9eab5c0a89ab9309c003ccb7a6372f2965.exe

    • Size

      1.1MB

    • MD5

      600aca0c8ca3eb6ab67adb08ed9c68b0

    • SHA1

      c937e74fa33e667094a28348899e9859ed8fd237

    • SHA256

      2bb55a42ae8b9d98ed1e5cb6b11b4b9eab5c0a89ab9309c003ccb7a6372f2965

    • SHA512

      ed7f0a8dfe9b3405e3617628c149b8944fb5b906e60ffd320daa4d478eef02a6ea31881a1388fde61219022ded13e864c147df6df8402b9e630951ab47663f7a

    • SSDEEP

      24576:mRmJkcoQricOIQxiZY1iaI9tlvQEWYnfHYHfHboZ:jJZoQrbTFZY1iaI/N4WvYHfHboZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks