General

  • Target

    b4bea581890a1f0e57955751fff4878328d67e3ac7d7b825d8f7ef07603a4a82

  • Size

    529KB

  • Sample

    241218-ewcpraspav

  • MD5

    a3aa7f4daceddd1ec8b2d9dbcfcf3018

  • SHA1

    6955a629c7b2b1fbe7ab8822814f52c1d1e2ea92

  • SHA256

    b4bea581890a1f0e57955751fff4878328d67e3ac7d7b825d8f7ef07603a4a82

  • SHA512

    e9223cd43b05b111c5f1f44e53a7296a223815f2d6e5aa373e8e11613eebd6dfd01c1998d67934b5dc76d1639f4a06a32e11d2bcd98969d34770f92ed7631b60

  • SSDEEP

    12288:BquErHF6xC9D6DmR1J98w4oknqOOCyQfATt2vFKQ:Erl6kD68JmlotQfPKQ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      b4bea581890a1f0e57955751fff4878328d67e3ac7d7b825d8f7ef07603a4a82

    • Size

      529KB

    • MD5

      a3aa7f4daceddd1ec8b2d9dbcfcf3018

    • SHA1

      6955a629c7b2b1fbe7ab8822814f52c1d1e2ea92

    • SHA256

      b4bea581890a1f0e57955751fff4878328d67e3ac7d7b825d8f7ef07603a4a82

    • SHA512

      e9223cd43b05b111c5f1f44e53a7296a223815f2d6e5aa373e8e11613eebd6dfd01c1998d67934b5dc76d1639f4a06a32e11d2bcd98969d34770f92ed7631b60

    • SSDEEP

      12288:BquErHF6xC9D6DmR1J98w4oknqOOCyQfATt2vFKQ:Erl6kD68JmlotQfPKQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks