General

  • Target

    wealthzx.exe

  • Size

    702KB

  • Sample

    220522-gkxlwscaal

  • MD5

    cedfbc442669a16506da0bf8bb4d0b30

  • SHA1

    02d0715bd61f19161b3db3c1aadd6f755a732a48

  • SHA256

    8ddea9e35c9ed6625bf63dcae0b8d10187aa038f1ed35a95e6e4fc5d5e24033b

  • SHA512

    1a9b9e11ab86b519df4de0a43cd34168a14a7dd9e9b9412daf32a025a6754f19c61ae8ac85a579c5eb88f84efdcc5920f32c303e88434bedb462df9d31eac782

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.softemtemizlik.com
  • Port:
    587
  • Username:
    info@softemtemizlik.com
  • Password:
    softem.1010
  • Email To:
    pdsctsops@gmail.com

Targets

    • Target

      wealthzx.exe

    • Size

      702KB

    • MD5

      cedfbc442669a16506da0bf8bb4d0b30

    • SHA1

      02d0715bd61f19161b3db3c1aadd6f755a732a48

    • SHA256

      8ddea9e35c9ed6625bf63dcae0b8d10187aa038f1ed35a95e6e4fc5d5e24033b

    • SHA512

      1a9b9e11ab86b519df4de0a43cd34168a14a7dd9e9b9412daf32a025a6754f19c61ae8ac85a579c5eb88f84efdcc5920f32c303e88434bedb462df9d31eac782

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks