General

  • Target

    DHL_119040 receipt document,pdf.exe

  • Size

    138KB

  • Sample

    211021-lm85xsaba6

  • MD5

    61e692e05bdbeff4a1bea19377912db6

  • SHA1

    5039ad90d9112ff1262b1cee94144fcb7b1fcd94

  • SHA256

    596a47f21a6bdd84b04be8426b613004885f142bdc0327e94185e54ce7027def

  • SHA512

    5f19697ae104ebc025821c79c678a5f470ff99349e506b6420642b7c72ab14609826a93692edbaa2698d6a7c9961712d39b01934000ee7f3e0e0a70ba27738f2

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.msm.com.ec
  • Port:
    587
  • Username:
    ventas@msm.com.ec
  • Password:
    MundoSano2021

Targets

    • Target

      DHL_119040 receipt document,pdf.exe

    • Size

      138KB

    • MD5

      61e692e05bdbeff4a1bea19377912db6

    • SHA1

      5039ad90d9112ff1262b1cee94144fcb7b1fcd94

    • SHA256

      596a47f21a6bdd84b04be8426b613004885f142bdc0327e94185e54ce7027def

    • SHA512

      5f19697ae104ebc025821c79c678a5f470ff99349e506b6420642b7c72ab14609826a93692edbaa2698d6a7c9961712d39b01934000ee7f3e0e0a70ba27738f2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks