General

  • Target

    982ce45e891648e586e05d172a32580a141d52a7861dd4afdeebfc20777dcbb3.exe

  • Size

    535KB

  • Sample

    240625-b2yydsxaqq

  • MD5

    902b1157277ecbe3917b85fa905e7f4d

  • SHA1

    6dbb38742564c4f64718e60e5efed146b30b0c83

  • SHA256

    982ce45e891648e586e05d172a32580a141d52a7861dd4afdeebfc20777dcbb3

  • SHA512

    71ef622ca4c59a1ec548cd21f09c40d4c6356a75158dbe54008596988d8bc6ee15926012d2cb97a57f5dbad22f3dadbf5d6f234199e3240edb3814d6fa7f746b

  • SSDEEP

    6144:fx3JWzvWtGwhhvISKQjDNSfZilVj4G5MNklWJ8u//z8K8ICFw7JwHOevcKX3frqg:f3mmhAv4qAlMSMRF8s7yHJv/v+2LuSn

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      982ce45e891648e586e05d172a32580a141d52a7861dd4afdeebfc20777dcbb3.exe

    • Size

      535KB

    • MD5

      902b1157277ecbe3917b85fa905e7f4d

    • SHA1

      6dbb38742564c4f64718e60e5efed146b30b0c83

    • SHA256

      982ce45e891648e586e05d172a32580a141d52a7861dd4afdeebfc20777dcbb3

    • SHA512

      71ef622ca4c59a1ec548cd21f09c40d4c6356a75158dbe54008596988d8bc6ee15926012d2cb97a57f5dbad22f3dadbf5d6f234199e3240edb3814d6fa7f746b

    • SSDEEP

      6144:fx3JWzvWtGwhhvISKQjDNSfZilVj4G5MNklWJ8u//z8K8ICFw7JwHOevcKX3frqg:f3mmhAv4qAlMSMRF8s7yHJv/v+2LuSn

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables with potential process hoocking

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks