General

  • Target

    FCT-0987655678998.exe

  • Size

    650KB

  • Sample

    230601-sjgd3afc6s

  • MD5

    f84c0a7f4c5dd7e7e999e1a2b4f0e029

  • SHA1

    ff5f7f5c4ccf53251cd3b09a3241a33af797fa3c

  • SHA256

    5c067b4130c714d5ac0b0acdecb9ac0a69cc5354250a514a5c78c194de8e5f52

  • SHA512

    dc691aed1f5619dfbf97a917dd508b5cab5481ec9c61dd470b0e6a720a3893bda515558a7b002a63921cbba29035c703dee1b77091c9212c02434836dbf13e4b

  • SSDEEP

    12288:0ZObEP/SJa1EO9U7+F1GB4zI2L3RmBWQCUJjbSpKngmfiwPU:0t/42YrkBmwQC2jb65wM

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sienkakupeste.com
  • Port:
    587
  • Username:
    info@sienkakupeste.com
  • Password:
    010203sienka++

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sienkakupeste.com
  • Port:
    587
  • Username:
    info@sienkakupeste.com
  • Password:
    010203sienka++
  • Email To:
    saleseuropower2@yandex.com

Targets

    • Target

      FCT-0987655678998.exe

    • Size

      650KB

    • MD5

      f84c0a7f4c5dd7e7e999e1a2b4f0e029

    • SHA1

      ff5f7f5c4ccf53251cd3b09a3241a33af797fa3c

    • SHA256

      5c067b4130c714d5ac0b0acdecb9ac0a69cc5354250a514a5c78c194de8e5f52

    • SHA512

      dc691aed1f5619dfbf97a917dd508b5cab5481ec9c61dd470b0e6a720a3893bda515558a7b002a63921cbba29035c703dee1b77091c9212c02434836dbf13e4b

    • SSDEEP

      12288:0ZObEP/SJa1EO9U7+F1GB4zI2L3RmBWQCUJjbSpKngmfiwPU:0t/42YrkBmwQC2jb65wM

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks