General

  • Target

    Cotización_C_489.pdf.exe

  • Size

    1.2MB

  • Sample

    210623-taeb5h8df2

  • MD5

    124b94ecdf05968dfa1a5f6b52ee45cf

  • SHA1

    b28ca385e59febffb3030f281afc13ea6818bad4

  • SHA256

    0b3725e141c6adcb04e588533b8dc7a746f4bccc639400a043c4091490cd342d

  • SHA512

    a2923a3ae9778927af643b17f9abd33561154de1ae194fa39368f7f631b7d7af81969cabf0de75f16577643452865cdfdbb9c41ef1689fe08d0291eb63474907

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.prozero-d.com
  • Port:
    587
  • Username:
    afterdark@prozero-d.com
  • Password:
    icui4cu2@@

Targets

    • Target

      Cotización_C_489.pdf.exe

    • Size

      1.2MB

    • MD5

      124b94ecdf05968dfa1a5f6b52ee45cf

    • SHA1

      b28ca385e59febffb3030f281afc13ea6818bad4

    • SHA256

      0b3725e141c6adcb04e588533b8dc7a746f4bccc639400a043c4091490cd342d

    • SHA512

      a2923a3ae9778927af643b17f9abd33561154de1ae194fa39368f7f631b7d7af81969cabf0de75f16577643452865cdfdbb9c41ef1689fe08d0291eb63474907

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks