General

  • Target

    a67452d9d5bef12d16cfb99ea9569017.exe

  • Size

    25KB

  • Sample

    211128-jczgmagffm

  • MD5

    a67452d9d5bef12d16cfb99ea9569017

  • SHA1

    db0fd1ccaf3d7abf459f694d4fe090a97af7548e

  • SHA256

    72914f27eeb35b9ad79b12b186e049afa19b88525a41d0e0b4306165a78a4d47

  • SHA512

    e4bec43ff67c2f500afde9724916a31e47001f90c72321780bb8411656f89e778d08388b6ba74a5a12908cead1dca506a6dab7f68a30f5cca3568bafdfb370b3

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.swissunionch.com
  • Port:
    587
  • Username:
    kelvin1@swissunionch.com
  • Password:
    usV(xxUWCa;u

Targets

    • Target

      a67452d9d5bef12d16cfb99ea9569017.exe

    • Size

      25KB

    • MD5

      a67452d9d5bef12d16cfb99ea9569017

    • SHA1

      db0fd1ccaf3d7abf459f694d4fe090a97af7548e

    • SHA256

      72914f27eeb35b9ad79b12b186e049afa19b88525a41d0e0b4306165a78a4d47

    • SHA512

      e4bec43ff67c2f500afde9724916a31e47001f90c72321780bb8411656f89e778d08388b6ba74a5a12908cead1dca506a6dab7f68a30f5cca3568bafdfb370b3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks