General

  • Target

    c70f5ef260a7358bf724555539cbbd5f.exe

  • Size

    552KB

  • Sample

    210114-hkdygaba8n

  • MD5

    c70f5ef260a7358bf724555539cbbd5f

  • SHA1

    f15a0d5f846690800266275aef0869dd5b18915f

  • SHA256

    2d499e9bab6a4e8f3bb98999b4069e12e093de03e5835c1371f95fe9140ab9ce

  • SHA512

    e39992a294b814798b86c12db5aa03b6d0ae8612c71e77d3c2bf635f99f48337b8f74a43d77a302014146a29275a422087872c1e4d03277f57e0c2aadf5799b9

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    pro40.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vexa@2013

Targets

    • Target

      c70f5ef260a7358bf724555539cbbd5f.exe

    • Size

      552KB

    • MD5

      c70f5ef260a7358bf724555539cbbd5f

    • SHA1

      f15a0d5f846690800266275aef0869dd5b18915f

    • SHA256

      2d499e9bab6a4e8f3bb98999b4069e12e093de03e5835c1371f95fe9140ab9ce

    • SHA512

      e39992a294b814798b86c12db5aa03b6d0ae8612c71e77d3c2bf635f99f48337b8f74a43d77a302014146a29275a422087872c1e4d03277f57e0c2aadf5799b9

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks