General

  • Target

    xoTrmJx7i6t8dy9.exe

  • Size

    573KB

  • Sample

    201119-vcjntwvr8a

  • MD5

    51fd98c3d315f959249a13de6f2b7960

  • SHA1

    3f9bfd3af0ac8868b19b1337b89ede5a2afbaba3

  • SHA256

    ed18bf204914e704fe7d77312b00b654d329666334abaf7bd3af546bad9dc4a6

  • SHA512

    db3c05302eb380a4b0717c19753a73d3a056870179b8df233ff95f0ab83cb1ffa0a01c677d414d3113cc4475270fbf54dcc7e080fd2d8684313427a351bc934a

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    orisinlog.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    fENCThl=g{Ft

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://orisinlog.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    fENCThl=g{Ft

Targets

    • Target

      xoTrmJx7i6t8dy9.exe

    • Size

      573KB

    • MD5

      51fd98c3d315f959249a13de6f2b7960

    • SHA1

      3f9bfd3af0ac8868b19b1337b89ede5a2afbaba3

    • SHA256

      ed18bf204914e704fe7d77312b00b654d329666334abaf7bd3af546bad9dc4a6

    • SHA512

      db3c05302eb380a4b0717c19753a73d3a056870179b8df233ff95f0ab83cb1ffa0a01c677d414d3113cc4475270fbf54dcc7e080fd2d8684313427a351bc934a

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks