General

  • Target

    a8c460b6ee46cb364d7699fdaefbaf197a7db1e61aa9550874a83d1e11fb1d36N.exe

  • Size

    130KB

  • Sample

    241127-r85yaaxrbs

  • MD5

    6fb96ebfa8ef2012bf5bfd0f3d95fcc0

  • SHA1

    e76aded5fc8d72b84b7b61b3b8de5a8155337f3e

  • SHA256

    a8c460b6ee46cb364d7699fdaefbaf197a7db1e61aa9550874a83d1e11fb1d36

  • SHA512

    6a1f93e100a2b390a9ef6cd13d9c4d86ee79a45d835f48731a1cd7e2aaf7824206e1779944cc9ca47e1b2146e57611d779ca10408be9608d824f69f23c47917b

  • SSDEEP

    3072:J+XlnyGeKXVgLNIv+VMafK2b5YrsLrwvxdWgbY:anyTk+VM0TbA3b

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      a8c460b6ee46cb364d7699fdaefbaf197a7db1e61aa9550874a83d1e11fb1d36N.exe

    • Size

      130KB

    • MD5

      6fb96ebfa8ef2012bf5bfd0f3d95fcc0

    • SHA1

      e76aded5fc8d72b84b7b61b3b8de5a8155337f3e

    • SHA256

      a8c460b6ee46cb364d7699fdaefbaf197a7db1e61aa9550874a83d1e11fb1d36

    • SHA512

      6a1f93e100a2b390a9ef6cd13d9c4d86ee79a45d835f48731a1cd7e2aaf7824206e1779944cc9ca47e1b2146e57611d779ca10408be9608d824f69f23c47917b

    • SSDEEP

      3072:J+XlnyGeKXVgLNIv+VMafK2b5YrsLrwvxdWgbY:anyTk+VM0TbA3b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks