General

  • Target

    c362082b3ebb3ab709e8c6d5ab4518705efbf8e6e8f70f1323796be65a8141bb.exe

  • Size

    1.2MB

  • Sample

    250207-rfq9estmay

  • MD5

    f502eb93cf859c50eb00c32af62b8e08

  • SHA1

    19cfccb07a804fccf317c0303400a14a68ca27e3

  • SHA256

    c362082b3ebb3ab709e8c6d5ab4518705efbf8e6e8f70f1323796be65a8141bb

  • SHA512

    bc3f591ce3f6a599d44c8c2d9d77bdd5bd6d2c0d3735fc09c7fb92844c595edd7e45fde04adf6a8ed14c0860603598c4698108646887a2eafd1f0f1aaeee8d26

  • SSDEEP

    24576:7SexfdrlWTWXqeHCG9HXq7TYA2rQtlHPI4p:mLTvG9rQB

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      c362082b3ebb3ab709e8c6d5ab4518705efbf8e6e8f70f1323796be65a8141bb.exe

    • Size

      1.2MB

    • MD5

      f502eb93cf859c50eb00c32af62b8e08

    • SHA1

      19cfccb07a804fccf317c0303400a14a68ca27e3

    • SHA256

      c362082b3ebb3ab709e8c6d5ab4518705efbf8e6e8f70f1323796be65a8141bb

    • SHA512

      bc3f591ce3f6a599d44c8c2d9d77bdd5bd6d2c0d3735fc09c7fb92844c595edd7e45fde04adf6a8ed14c0860603598c4698108646887a2eafd1f0f1aaeee8d26

    • SSDEEP

      24576:7SexfdrlWTWXqeHCG9HXq7TYA2rQtlHPI4p:mLTvG9rQB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks