General

  • Target

    f366a3ae7288d8c79063044af4427617ec227ebc960cf143dc0a020f3827b92e.exe

  • Size

    465KB

  • Sample

    250207-rs412strb1

  • MD5

    e478ed355e068b56b658d62359cff6ca

  • SHA1

    7c394f05d4eaba81e427f79bba08a5d413809537

  • SHA256

    f366a3ae7288d8c79063044af4427617ec227ebc960cf143dc0a020f3827b92e

  • SHA512

    7883fa17e55dfe58261cd50e2789aa8a0c4a940fad2e295879718c7409ffed6001cd688801e64e09613291af0577626b161da40de2e999ef72c3a1f600221c2e

  • SSDEEP

    12288:SYV6MorX7qzuC3QHO9FQVHPF51jgcmwmkVOvtJmUHJ/r:hBXu9HGaVHmwN4Jm2Nr

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      f366a3ae7288d8c79063044af4427617ec227ebc960cf143dc0a020f3827b92e.exe

    • Size

      465KB

    • MD5

      e478ed355e068b56b658d62359cff6ca

    • SHA1

      7c394f05d4eaba81e427f79bba08a5d413809537

    • SHA256

      f366a3ae7288d8c79063044af4427617ec227ebc960cf143dc0a020f3827b92e

    • SHA512

      7883fa17e55dfe58261cd50e2789aa8a0c4a940fad2e295879718c7409ffed6001cd688801e64e09613291af0577626b161da40de2e999ef72c3a1f600221c2e

    • SSDEEP

      12288:SYV6MorX7qzuC3QHO9FQVHPF51jgcmwmkVOvtJmUHJ/r:hBXu9HGaVHmwN4Jm2Nr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks