General

  • Target

    3000b3ec5d8622397d5b4288810e7215bfddcf2573023059fc84259b0bafa4f3.exe

  • Size

    640KB

  • Sample

    241121-d48xgsykfs

  • MD5

    9658dbdba747c4739e1b5c4bdcdb5d4d

  • SHA1

    201c85ae456e4696d995ec232b43bb665f52fb32

  • SHA256

    3000b3ec5d8622397d5b4288810e7215bfddcf2573023059fc84259b0bafa4f3

  • SHA512

    b51e4ac8c75d3d38bc394145ca684d4267ffcf5130aac7f1a6182cee9648df55b30114087c21a0091531dd9983937e426f289c3fd892be1e88d0e97063ccdaa7

  • SSDEEP

    12288:av/AYnEyHWiaHzNwsQg/8wvUwLywNaSctMXg:kYpmQ8whiMw

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      3000b3ec5d8622397d5b4288810e7215bfddcf2573023059fc84259b0bafa4f3.exe

    • Size

      640KB

    • MD5

      9658dbdba747c4739e1b5c4bdcdb5d4d

    • SHA1

      201c85ae456e4696d995ec232b43bb665f52fb32

    • SHA256

      3000b3ec5d8622397d5b4288810e7215bfddcf2573023059fc84259b0bafa4f3

    • SHA512

      b51e4ac8c75d3d38bc394145ca684d4267ffcf5130aac7f1a6182cee9648df55b30114087c21a0091531dd9983937e426f289c3fd892be1e88d0e97063ccdaa7

    • SSDEEP

      12288:av/AYnEyHWiaHzNwsQg/8wvUwLywNaSctMXg:kYpmQ8whiMw

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks