General

  • Target

    Details.exe

  • Size

    399KB

  • Sample

    211201-jhkknadgd5

  • MD5

    4a2394c58bbba9bd7d72f10c4f0cbc70

  • SHA1

    4b4de49d29474fcbbc0fed996e551848d14ef5e8

  • SHA256

    1909bc166ed4a9211d5d4fff2baf93a07268335ac80b372b0552fe414013d45d

  • SHA512

    026686a8769fdf1d779ede9bb6e1e9cf448e4677086d078eee4500f8d40d6e2630b46185adaad8c48221f80430afd1d97abf0ffc6917b34355b9b127693ef5be

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.greentrading.com.pk
  • Port:
    26
  • Username:
    info@greentrading.com.pk
  • Password:
    lovetoall

Targets

    • Target

      Details.exe

    • Size

      399KB

    • MD5

      4a2394c58bbba9bd7d72f10c4f0cbc70

    • SHA1

      4b4de49d29474fcbbc0fed996e551848d14ef5e8

    • SHA256

      1909bc166ed4a9211d5d4fff2baf93a07268335ac80b372b0552fe414013d45d

    • SHA512

      026686a8769fdf1d779ede9bb6e1e9cf448e4677086d078eee4500f8d40d6e2630b46185adaad8c48221f80430afd1d97abf0ffc6917b34355b9b127693ef5be

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks