General

  • Target

    aa4942da9a41c2c7ce12bc3855eb2350.bin

  • Size

    438KB

  • Sample

    230206-l455ladd36

  • MD5

    2d199b149dd83ba5febbe393980b1f1c

  • SHA1

    75ce107e804c40d401587bbbfea64d144423d423

  • SHA256

    3174c0df84717ce0a70b569c70444e9b9c8a4da3d6dbe73a0fd1632cac31e610

  • SHA512

    fbaeabb45fe4271e1cad7be8da7591b07c2d2dff4897b30ba2e93d9a1f417f08ff5e9055ff85947fad941f2b9fa4636bb3a349933d81ddf1e2153268842ab123

  • SSDEEP

    12288:AzcwA646AfoutRVJ6cH3wl6smiTmSu1GRFZ1kr9JsOuxN:+A64quScH3wt3LCr9JsH

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    pro40.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vexa@2013

Targets

    • Target

      c5fcb78f3d8f37ad58277089aa4ad3f4e6f0388ad8ee3c8e19065bab1b7f38e7.exe

    • Size

      483KB

    • MD5

      aa4942da9a41c2c7ce12bc3855eb2350

    • SHA1

      07ddcf865989c7f5a07a9835f59d222e5a438edd

    • SHA256

      c5fcb78f3d8f37ad58277089aa4ad3f4e6f0388ad8ee3c8e19065bab1b7f38e7

    • SHA512

      abb6c4b4ccd210623e7eaa3638e142e91b58e22cc09719a6f233402ed451e68af7fe11ef6bb7fd7ff293b68f7042d147f4db388a9a7506815f6640c7e78beab3

    • SSDEEP

      12288:2CcmFM0luMoL4Ip5iYVCZWOERUB3HDrOtW:27m20M4IpAqCZZE6B3POc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks