General

  • Target

    cb84dc0df43c3fe063e43f547dd9678ffa8c054ba955f98bf35c9a8581be5c87.exe

  • Size

    131KB

  • Sample

    250110-ryxtxsxkdy

  • MD5

    4634e3e6584b3f6f79c63b718dcd858c

  • SHA1

    2a540ad0f78d989a4a32521354aaa7ec65a83a9e

  • SHA256

    cb84dc0df43c3fe063e43f547dd9678ffa8c054ba955f98bf35c9a8581be5c87

  • SHA512

    3e5246d594069ba469cf26dc8002e0020a874b2f0ceac25d31b5dcdbf6aca46901c7409a227460c3ff532cebfdd3f0009ad898b76cf5e97c5024761a0b1fdf52

  • SSDEEP

    3072:nq/6fidzVhevEzfPUilnb51D5sLCwvxpJgbY:q2i5ckbD8Cb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      cb84dc0df43c3fe063e43f547dd9678ffa8c054ba955f98bf35c9a8581be5c87.exe

    • Size

      131KB

    • MD5

      4634e3e6584b3f6f79c63b718dcd858c

    • SHA1

      2a540ad0f78d989a4a32521354aaa7ec65a83a9e

    • SHA256

      cb84dc0df43c3fe063e43f547dd9678ffa8c054ba955f98bf35c9a8581be5c87

    • SHA512

      3e5246d594069ba469cf26dc8002e0020a874b2f0ceac25d31b5dcdbf6aca46901c7409a227460c3ff532cebfdd3f0009ad898b76cf5e97c5024761a0b1fdf52

    • SSDEEP

      3072:nq/6fidzVhevEzfPUilnb51D5sLCwvxpJgbY:q2i5ckbD8Cb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks