General

  • Target

    TT500202106029589435472.exe

  • Size

    937KB

  • Sample

    210607-k9mcwtqs4e

  • MD5

    85aa9d1b698d8f57b88e32f8a6a31a1a

  • SHA1

    4d4a7f6a9256c37081393aba3e48f188a0aad630

  • SHA256

    ff99d00779dbb0c55d69212b104f4fcf7f52e7ff265df47ee780d6ed84b606e9

  • SHA512

    7f5697ae243993dac743e51b1cee126a782da7c2d405d94e99e22fad6693ec52f76c487c02b60a5cab85f5b554d5db89dc1baae5be76a602b1c44b62175309c4

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.totalkitchensandbathrooms.com.au
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    smith@247

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.totalkitchensandbathrooms.com.au
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    smith@247

Targets

    • Target

      TT500202106029589435472.exe

    • Size

      937KB

    • MD5

      85aa9d1b698d8f57b88e32f8a6a31a1a

    • SHA1

      4d4a7f6a9256c37081393aba3e48f188a0aad630

    • SHA256

      ff99d00779dbb0c55d69212b104f4fcf7f52e7ff265df47ee780d6ed84b606e9

    • SHA512

      7f5697ae243993dac743e51b1cee126a782da7c2d405d94e99e22fad6693ec52f76c487c02b60a5cab85f5b554d5db89dc1baae5be76a602b1c44b62175309c4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks