General

  • Target

    7e3b08163812d6a9ff4e279058f603e5

  • Size

    388KB

  • Sample

    211203-pg6pdsbdh4

  • MD5

    7e3b08163812d6a9ff4e279058f603e5

  • SHA1

    29a1e69c99fadc447a6958c24e45c71127e88d6b

  • SHA256

    a6a4c5aaefa51d2f614a6f21e83b64d63e29fb868c8d410dacf317ad220f774a

  • SHA512

    7682105ae32834638f77c1c3282bdc3eefc42d922843d12aa346f4c9b2d68269764677b29444953bbff8a9245d2c14416817e879550b170a1921d14366af492b

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sapphireclothing.com
  • Port:
    587
  • Username:
    hr@sapphireclothing.com
  • Password:
    hrSap2018

Targets

    • Target

      7e3b08163812d6a9ff4e279058f603e5

    • Size

      388KB

    • MD5

      7e3b08163812d6a9ff4e279058f603e5

    • SHA1

      29a1e69c99fadc447a6958c24e45c71127e88d6b

    • SHA256

      a6a4c5aaefa51d2f614a6f21e83b64d63e29fb868c8d410dacf317ad220f774a

    • SHA512

      7682105ae32834638f77c1c3282bdc3eefc42d922843d12aa346f4c9b2d68269764677b29444953bbff8a9245d2c14416817e879550b170a1921d14366af492b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks