General

  • Target

    Nº 180071974.7z

  • Size

    312KB

  • Sample

    230601-qtc4aaee33

  • MD5

    9fc6a3e9ad2db97012f8686dd28ba44d

  • SHA1

    c0c07031a5fdca19c6edf160db07121c3c252a13

  • SHA256

    f054cb7a60752d7c6da00cba3c0d2a351ef8321e749d4d0d07927a1f45b336b7

  • SHA512

    9826a0952ae57506b91a56a5638d139c309a9663dd6544b1198b95f0b0c0dd55bf34ffcc65aae60af1134f15957897d7bf7c15d2dc1c86c01f8c2fd99249ecfc

  • SSDEEP

    6144:WxLqoPrxR3w5t3UpPS/9yDwNUhAg686fRH4vyyXl0BrrmWtAVQmoh/OfrUoIu:SWo1ROkpa//NN86fORl0ddYhG/OwK

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rampelloelectricidad.com
  • Port:
    587
  • Username:
    rampello@rampelloelectricidad.com
  • Password:
    raulruben55
  • Email To:
    coachfundraising1@yandex.com

Targets

    • Target

      Nº 180071974.exe

    • Size

      583KB

    • MD5

      a1d2b08ee432c2e3d4920008814d97ac

    • SHA1

      8140db54e2dfaf44712d354edf9d04aebb994278

    • SHA256

      c945108e9c0367fe7bc7777e206196b0064148191b0e9f867e93d8fe84b2e87b

    • SHA512

      8cfff82343839763f67773d26cafbed826a2b94cc94aeccbea2692f1895f1e2581b74c250494e30abf1a7aa2f23408ff0404b428a3911ecb96b6ca41fc73a192

    • SSDEEP

      12288:iZXo8k47LVYmCADj0PqhgJP/1qnNQYTwvJ:iZXomK2yaA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks