Rewterz Threat Alert – LockBit 3.0 Ransomware – Active IOCs
July 22, 2022Rewterz Threat Alert – DangerousPassword APT Group – Active IOCs
July 22, 2022Rewterz Threat Alert – LockBit 3.0 Ransomware – Active IOCs
July 22, 2022Rewterz Threat Alert – DangerousPassword APT Group – Active IOCs
July 22, 2022Severity
Medium
Analysis Summary
Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it also has additional capabilities such as taking screenshots and extracting data from the clipboard. Snake can also extract and exfiltrate data from browsers and email clients.
Snake’s name was derived from strings found in its log files and string obfuscation code. Using the malware’s builder, a threat actor can select and configure desired features and then generate new payloads. For this reason, the capabilities of samples found in the wild can vary.
Recently, Snake Keylogger preys on Ukrainian citizens. A hyperlinked image appears in the email. A tgz file containing the Keylogger is downloaded from OneDrive when you click on the image. The subject of the email is Остаточний платіж (Final payment)
Impact
- Credential Theft
Indicators of Compromise
MD5
- 3f7a9d78d7126c5ebb92b09a7077cf5b
SHA-256
- 704b0ac0db2351f5fbc213ecb4193f96e37600a5b28992eaf961ea1b9bc39f8f
SHA-1
- e20150c5baf7381e553d12198c78f76b6e166f95
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment