General

  • Target

    S1P098765435000.exe

  • Size

    712KB

  • Sample

    230610-l4hdjaef39

  • MD5

    b79f37ab5b716cf189282ece4473e0fb

  • SHA1

    810b5bd611b4bfb5363b44002563484668820ae1

  • SHA256

    88001561b8572bc81462f293cb546b3b1ecd0d6a83097a2d26471cc282f25864

  • SHA512

    cd46c17d6f6969c1cf8aa86815f45a741854c3c45c6704239f0099c2ed46a70e8968f17616b70447c5e69c763a67c26a37c53325c487e9bc0e86d61945aee847

  • SSDEEP

    12288:4ba8Pr0lWxMzIHREJVk/bq4izoW/m77K2WKSBX0/SGMXNWy2TN6jyWATFEdLJ9qZ:4ellWxMiQW/O4ue77vo0Kz8y/aF+180g

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sienkakupeste.com
  • Port:
    587
  • Username:
    info@sienkakupeste.com
  • Password:
    010203sienka++
  • Email To:
    saleseuropower1@yandex.com

Targets

    • Target

      S1P098765435000.exe

    • Size

      712KB

    • MD5

      b79f37ab5b716cf189282ece4473e0fb

    • SHA1

      810b5bd611b4bfb5363b44002563484668820ae1

    • SHA256

      88001561b8572bc81462f293cb546b3b1ecd0d6a83097a2d26471cc282f25864

    • SHA512

      cd46c17d6f6969c1cf8aa86815f45a741854c3c45c6704239f0099c2ed46a70e8968f17616b70447c5e69c763a67c26a37c53325c487e9bc0e86d61945aee847

    • SSDEEP

      12288:4ba8Pr0lWxMzIHREJVk/bq4izoW/m77K2WKSBX0/SGMXNWy2TN6jyWATFEdLJ9qZ:4ellWxMiQW/O4ue77vo0Kz8y/aF+180g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks