General

  • Target

    d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7.exe

  • Size

    244KB

  • Sample

    241123-yg969azjdk

  • MD5

    5b9067516c6af0b47434bfbd4796504a

  • SHA1

    ebb265c4582e263edcb43954a1bc4752d955d475

  • SHA256

    d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7

  • SHA512

    2ed40c3687d69817efa418f39ea408d9195531b5d8b9875e5bde569f5e941b0c17b4e83b2186b84f46b159d50b5f1559f7c94279b0a17695f694eeeca57f0776

  • SSDEEP

    6144:ngbDaX+pQ7uDe2bQD3g+UP/hry30vBEZTJv:nghpleCQD3g+UP/sB1

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7.exe

    • Size

      244KB

    • MD5

      5b9067516c6af0b47434bfbd4796504a

    • SHA1

      ebb265c4582e263edcb43954a1bc4752d955d475

    • SHA256

      d101b7f3d7b606775eb8dfbf673b3d62f0246985c8ab2742cd0e54efbde1a3d7

    • SHA512

      2ed40c3687d69817efa418f39ea408d9195531b5d8b9875e5bde569f5e941b0c17b4e83b2186b84f46b159d50b5f1559f7c94279b0a17695f694eeeca57f0776

    • SSDEEP

      6144:ngbDaX+pQ7uDe2bQD3g+UP/hry30vBEZTJv:nghpleCQD3g+UP/sB1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks