General

  • Target

    4d59d590fcadb888c844987896fc67729f3fb835a3e18b8ce360d15a2ab3b9d6.exe

  • Size

    577KB

  • Sample

    250121-ddp2pasnfl

  • MD5

    4d2ac4c9b9919a4cfd1643a0716d194d

  • SHA1

    904dbd521da999b650472497b8a935a2a7affc7c

  • SHA256

    4d59d590fcadb888c844987896fc67729f3fb835a3e18b8ce360d15a2ab3b9d6

  • SHA512

    ebc622b9e9e69d5b7db332b2ad326bd8e8287cbf1eb7780231f2d9e90a97d769f15e16f5d53393c650e2c52ad4e9d06cf44e8b690de22cda596c318ff78ea8a4

  • SSDEEP

    12288:ZbRKjP7neKaXDCgcWjwPtJbS4qSCXPg9:DKjP7edXDCgc9P/m4tr

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      4d59d590fcadb888c844987896fc67729f3fb835a3e18b8ce360d15a2ab3b9d6.exe

    • Size

      577KB

    • MD5

      4d2ac4c9b9919a4cfd1643a0716d194d

    • SHA1

      904dbd521da999b650472497b8a935a2a7affc7c

    • SHA256

      4d59d590fcadb888c844987896fc67729f3fb835a3e18b8ce360d15a2ab3b9d6

    • SHA512

      ebc622b9e9e69d5b7db332b2ad326bd8e8287cbf1eb7780231f2d9e90a97d769f15e16f5d53393c650e2c52ad4e9d06cf44e8b690de22cda596c318ff78ea8a4

    • SSDEEP

      12288:ZbRKjP7neKaXDCgcWjwPtJbS4qSCXPg9:DKjP7edXDCgc9P/m4tr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks