General

  • Target

    9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23.exe

  • Size

    721KB

  • Sample

    250219-fmtgkszkx8

  • MD5

    374d59efbbcb915e8d203c9e528b6433

  • SHA1

    cd3bafde9c87aeb297f6acf70b535884ffc25314

  • SHA256

    9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23

  • SHA512

    baf4a2aea2c65e0579cc681f5488b0287df560ab9009c25e5bfefda7aa650108663351f4e00a6994d908d50e80da8cb8a2a46bd0751c3e83218cacd0779f639e

  • SSDEEP

    12288:Sry/qKCniM75YDTDMsFdq3prA1NXT7w3F+N5NGv1vgIJ6ICjUj4OYAkQXlHDXxSf:PMedGpGNXoV+KgIJ6Aj4OYeXl

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23.exe

    • Size

      721KB

    • MD5

      374d59efbbcb915e8d203c9e528b6433

    • SHA1

      cd3bafde9c87aeb297f6acf70b535884ffc25314

    • SHA256

      9b0ca796af0910c7fc67d8c81a0a4f061c53278bfef5a568d6101c2c1eb8af23

    • SHA512

      baf4a2aea2c65e0579cc681f5488b0287df560ab9009c25e5bfefda7aa650108663351f4e00a6994d908d50e80da8cb8a2a46bd0751c3e83218cacd0779f639e

    • SSDEEP

      12288:Sry/qKCniM75YDTDMsFdq3prA1NXT7w3F+N5NGv1vgIJ6ICjUj4OYAkQXlHDXxSf:PMedGpGNXoV+KgIJ6Aj4OYeXl

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks