General

  • Target

    Q-700004637 1004913.rar

  • Size

    8KB

  • Sample

    211020-egkrtagef3

  • MD5

    b666bd2575e8f49389aedb10b7b4f002

  • SHA1

    71b30ec6bc0e9c6427b54c2c4bfd62e8d66dffd0

  • SHA256

    8868e52f784c2d3915691ead8256d5f17972a856ef285f90c11ad832c1c9f683

  • SHA512

    cf613ed6c4f85814752ef16c06dc0d25ad9da7c27360fa797faf2d0fd68f6b65a0ee00188991278b737bd2a38973ce206d65c6e2c1582f4c6330d9573dc6cf1a

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.faks-allied-health.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    $Faks1234

Targets

    • Target

      Q-700004637 1004913.exe

    • Size

      22KB

    • MD5

      75b7a294df955b78f7adf5882e600273

    • SHA1

      df8f94ca5d228dcbda81efd0f8a0f37ff5ffa459

    • SHA256

      d3c93ce13c0f0a8dd07512cb0cf5ca7474983e15e136022cd98c4ab9b6063bd4

    • SHA512

      7b4c28d71348e798f3ddc7084767424754556a02a436b91e7516408b75031df32b4ba08fc60d658aeb381538c89bdf867373127ef29f6b03ec1ece56cf2e6da6

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks