General

  • Target

    New_Requests_30175082.exe

  • Size

    643KB

  • Sample

    211018-prptmaeecp

  • MD5

    68433ca29865ac4f36e1753c37f9128d

  • SHA1

    007d128da117c20d278508cfbfee948bc67ab404

  • SHA256

    f23eca05013c2cc70a34d176362ea27488988afba7f362b372509273dc5cd449

  • SHA512

    e089be063c7b88a6f6f872032533e1ada27deae584751f714b6740421f6956ba45d50bdd829fe4a3aad69e231fb03f9c2d34ce1e1039097b0bbca372afdbbe17

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    budgetn.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    eC~Z,TG&S9jM

Targets

    • Target

      New_Requests_30175082.exe

    • Size

      643KB

    • MD5

      68433ca29865ac4f36e1753c37f9128d

    • SHA1

      007d128da117c20d278508cfbfee948bc67ab404

    • SHA256

      f23eca05013c2cc70a34d176362ea27488988afba7f362b372509273dc5cd449

    • SHA512

      e089be063c7b88a6f6f872032533e1ada27deae584751f714b6740421f6956ba45d50bdd829fe4a3aad69e231fb03f9c2d34ce1e1039097b0bbca372afdbbe17

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks