General

  • Target

    f479546b3b39902eed49ccdd2749bde0d6ffb260311f8a8240fa69700e2a200e

  • Size

    561KB

  • Sample

    220705-p5w5vshdbr

  • MD5

    c01e2956b20349d01fd6f43f9a7ef0c3

  • SHA1

    4799db2196420cc90b24e28519ed459119d71fca

  • SHA256

    f479546b3b39902eed49ccdd2749bde0d6ffb260311f8a8240fa69700e2a200e

  • SHA512

    e3b466d2e32b1b3e18cc8669f957cf8dc66ca85827a2f40083931e0d72da8f67d8b01b71fea9bd8f601143d071f729184b9685198a974c247aaac7958141f469

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.stilltech.ro
  • Port:
    587
  • Username:
    office@stilltech.ro
  • Password:
    eurobit555ro
  • Email To:
    graceunlimited153@gmail.com

Targets

    • Target

      f479546b3b39902eed49ccdd2749bde0d6ffb260311f8a8240fa69700e2a200e

    • Size

      561KB

    • MD5

      c01e2956b20349d01fd6f43f9a7ef0c3

    • SHA1

      4799db2196420cc90b24e28519ed459119d71fca

    • SHA256

      f479546b3b39902eed49ccdd2749bde0d6ffb260311f8a8240fa69700e2a200e

    • SHA512

      e3b466d2e32b1b3e18cc8669f957cf8dc66ca85827a2f40083931e0d72da8f67d8b01b71fea9bd8f601143d071f729184b9685198a974c247aaac7958141f469

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks