General

  • Target

    09876535689000000.exe

  • Size

    803KB

  • Sample

    230610-l5mdwafd3y

  • MD5

    1ec78e859e083fdaeb0e6250d8992a22

  • SHA1

    2501143c84f3ef7c39527b72c733dd822ed4aaae

  • SHA256

    62bb51a5a9b90f4e6969abc219a75378eb3cb58d224df2a41644d5691ff69565

  • SHA512

    5c4222934a37e311162e639fd8495b9dc0c3f91208cee931f4e899933c50f66db22a466a5190e3c5f7c6dcf0474eef12dc67c936b24fbe9334a8bed85a3b4dff

  • SSDEEP

    12288:4AlbeU8m7xdvo/MdyrhFgtDsuBHsSj5J4+saBGEHw8YQL4ujmlQeu5dCMgeqJAD:Plb6m9BqmycgiH75BrwjQL1mCeOfge1

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sienkakupeste.com
  • Port:
    587
  • Username:
    info@sienkakupeste.com
  • Password:
    010203sienka++
  • Email To:
    saleseuropower2@yandex.com

Targets

    • Target

      09876535689000000.exe

    • Size

      803KB

    • MD5

      1ec78e859e083fdaeb0e6250d8992a22

    • SHA1

      2501143c84f3ef7c39527b72c733dd822ed4aaae

    • SHA256

      62bb51a5a9b90f4e6969abc219a75378eb3cb58d224df2a41644d5691ff69565

    • SHA512

      5c4222934a37e311162e639fd8495b9dc0c3f91208cee931f4e899933c50f66db22a466a5190e3c5f7c6dcf0474eef12dc67c936b24fbe9334a8bed85a3b4dff

    • SSDEEP

      12288:4AlbeU8m7xdvo/MdyrhFgtDsuBHsSj5J4+saBGEHw8YQL4ujmlQeu5dCMgeqJAD:Plb6m9BqmycgiH75BrwjQL1mCeOfge1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks