General

  • Target

    DOCUMENT.exe

  • Size

    949KB

  • Sample

    230512-g2lkysec71

  • MD5

    d17ceb11a280dd94490b1ea222e0ed61

  • SHA1

    507500c9f7f1c288d50d19dd4ce551eadf2a52be

  • SHA256

    53081b8516852eee078265c82b2f9b70367d3d2a50d8886e24f2704a3b683929

  • SHA512

    dad7118718356c78407770996014af793d5d7f9f238f8df81319fb5f0c46ec2793f6f130630d39a5bab221afdadd9361be90c52ff138f703181e733fba705b4a

  • SSDEEP

    24576:fHIQ/BL1+ckVowS88qvd5SLZQ37qqsCxcwnWe:px7rcFaQ3uRe

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bulktz.com.ng
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    gLC.]FMwGG]y

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bulktz.com.ng
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    gLC.]FMwGG]y

Targets

    • Target

      DOCUMENT.exe

    • Size

      949KB

    • MD5

      d17ceb11a280dd94490b1ea222e0ed61

    • SHA1

      507500c9f7f1c288d50d19dd4ce551eadf2a52be

    • SHA256

      53081b8516852eee078265c82b2f9b70367d3d2a50d8886e24f2704a3b683929

    • SHA512

      dad7118718356c78407770996014af793d5d7f9f238f8df81319fb5f0c46ec2793f6f130630d39a5bab221afdadd9361be90c52ff138f703181e733fba705b4a

    • SSDEEP

      24576:fHIQ/BL1+ckVowS88qvd5SLZQ37qqsCxcwnWe:px7rcFaQ3uRe

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks