General

  • Target

    81016f4d0891cae478bae8c06a51aef8.exe

  • Size

    734KB

  • Sample

    230505-nkhajahg96

  • MD5

    81016f4d0891cae478bae8c06a51aef8

  • SHA1

    41ae8925b074ae4aa7445a6579f7013bf8b39cc6

  • SHA256

    96d19b0d965d8afeb87bd82f3922f80b44224b8eb6b373bafcaeecfba7ea27d9

  • SHA512

    72b3a77f1fb0aa786a3d3d94300d82c069ee03c9b9c2d7ac6ce5b2a4019f41847f9af963c5dc07891dc4cd4b498b77d72f8635643353f63a7b90c2c9cf9ac8c1

  • SSDEEP

    12288:ce11Kh4YlKtDl0jeEETx6+kcXRn80/ZluwwH3Q43NODUfKu0T/o:pPKhhqDl0RapheF3dmY3B

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      81016f4d0891cae478bae8c06a51aef8.exe

    • Size

      734KB

    • MD5

      81016f4d0891cae478bae8c06a51aef8

    • SHA1

      41ae8925b074ae4aa7445a6579f7013bf8b39cc6

    • SHA256

      96d19b0d965d8afeb87bd82f3922f80b44224b8eb6b373bafcaeecfba7ea27d9

    • SHA512

      72b3a77f1fb0aa786a3d3d94300d82c069ee03c9b9c2d7ac6ce5b2a4019f41847f9af963c5dc07891dc4cd4b498b77d72f8635643353f63a7b90c2c9cf9ac8c1

    • SSDEEP

      12288:ce11Kh4YlKtDl0jeEETx6+kcXRn80/ZluwwH3Q43NODUfKu0T/o:pPKhhqDl0RapheF3dmY3B

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks