General

  • Target

    b2039ffb6400d433462ccfefb0f672b6.exe

  • Size

    483KB

  • Sample

    230107-s1bj5sdh24

  • MD5

    b2039ffb6400d433462ccfefb0f672b6

  • SHA1

    dc7503f531e0afaf954cb43f964373aeed56cd83

  • SHA256

    73f187b8ae22bc5de914056a6dad79f78c0d5de887020b31fda74737df837f78

  • SHA512

    591d1beffe914285c760ea611be028c43ac8a39821db8275634dc9b9a2c6d7179c6f268b934e64a63aa42c182282ba9f8831320eb87c8ae97563246e91263369

  • SSDEEP

    12288:2CcmFM0luMoL4Ip5iYVCZWOERUB3HDrOtW:27m20M4IpAqCZZE6B3POc

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    pro40.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vexa@2013

Targets

    • Target

      b2039ffb6400d433462ccfefb0f672b6.exe

    • Size

      483KB

    • MD5

      b2039ffb6400d433462ccfefb0f672b6

    • SHA1

      dc7503f531e0afaf954cb43f964373aeed56cd83

    • SHA256

      73f187b8ae22bc5de914056a6dad79f78c0d5de887020b31fda74737df837f78

    • SHA512

      591d1beffe914285c760ea611be028c43ac8a39821db8275634dc9b9a2c6d7179c6f268b934e64a63aa42c182282ba9f8831320eb87c8ae97563246e91263369

    • SSDEEP

      12288:2CcmFM0luMoL4Ip5iYVCZWOERUB3HDrOtW:27m20M4IpAqCZZE6B3POc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks