General

  • Target

    2021201093810010FG94JK029020020.7z

  • Size

    20KB

  • Sample

    211021-hs9rvshhh9

  • MD5

    7e4248f1c960096b74efd2e7745b9a07

  • SHA1

    7b7a9b29255bfc43f9f80dd1b51c488c0fec389f

  • SHA256

    8e2a7b1e1c07c69542330a686671ec62d886fe20d6c6691f3cc795fe69848b2e

  • SHA512

    ec701c8c85befedcb8a62c018ad5f022f25f79bf099d6880f35cf9d914d80916d6463495fe76921c60f9744def00428eab46055c33e098a1ed7ff12bd7ae5087

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.enmmakina.com.tr
  • Port:
    587
  • Username:
    m.gul@enmmakina.com.tr
  • Password:
    WG7sfIIm5

Targets

    • Target

      2021201093810010FG94JK029020020.exe

    • Size

      45KB

    • MD5

      a89cef9543591e9064a61e35af4876e7

    • SHA1

      ac8ebc3e52776ae14dc3f389470e15e65f662a65

    • SHA256

      96852c4c159018f2921b641693048a99069159104986e4212307c62e61924032

    • SHA512

      5cda6b42d039c94f9eb825dacb71695bdc50307703a7c933b8c2ede785ade2f94c80a9838b9177adf09735697d71c7cd32ed4c9d64ae4bd6902036945263faac

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks