General

  • Target

    rflBPCMj1cyYzdo.exe

  • Size

    543KB

  • Sample

    201117-4exwnwekjn

  • MD5

    471991a919b20cf3144b283fd58fb7aa

  • SHA1

    d3f8e3937a7b750176c363a0ef612deb6b5b7294

  • SHA256

    0c057157ad65ebd8e9fc9ace3fcd42d5692f8ba1854107bfb131595417178ebc

  • SHA512

    81aa64c6ebefe02e282579c58e2b37492241c9970497a89dfef90ef581afeb8aff63c100eab940ba76e2574fb5dd69dd96b94534a863ee220c487c01db65bac4

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    167.88.170.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    b6uFZQgo

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://167.88.170.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    b6uFZQgo

Targets

    • Target

      rflBPCMj1cyYzdo.exe

    • Size

      543KB

    • MD5

      471991a919b20cf3144b283fd58fb7aa

    • SHA1

      d3f8e3937a7b750176c363a0ef612deb6b5b7294

    • SHA256

      0c057157ad65ebd8e9fc9ace3fcd42d5692f8ba1854107bfb131595417178ebc

    • SHA512

      81aa64c6ebefe02e282579c58e2b37492241c9970497a89dfef90ef581afeb8aff63c100eab940ba76e2574fb5dd69dd96b94534a863ee220c487c01db65bac4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks