General

  • Target

    purchase order.pdf.z.exe

  • Size

    574KB

  • Sample

    230721-gjk7gacb79

  • MD5

    46ffb2ad4f371112f97e4cd4e3ce0a20

  • SHA1

    7417d39508785f418a6842793d161923355fd2d8

  • SHA256

    1ac4313c22a4b7098e5a93a662554c23d0c2fc1fc4b7e5a6951b69d4f95e799b

  • SHA512

    b4112df17f80d62d920043a83130e4e1e9a143daa26de26b613d44bf218be892d1659218e2c1b6aef1699cd6bb07887eb33d40283b1460a79d0fd33d41ad8f66

  • SSDEEP

    12288:HS6ln+flo/XciMv26Imbb9AeBcJWlnXGGPixW04Q2UL6qd2WaIgn6LE4:yTdCjECmbRAKcsgXjPax6LE4

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.kovarviajes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    P4tt1kr

Targets

    • Target

      purchase order.pdf.z.exe

    • Size

      574KB

    • MD5

      46ffb2ad4f371112f97e4cd4e3ce0a20

    • SHA1

      7417d39508785f418a6842793d161923355fd2d8

    • SHA256

      1ac4313c22a4b7098e5a93a662554c23d0c2fc1fc4b7e5a6951b69d4f95e799b

    • SHA512

      b4112df17f80d62d920043a83130e4e1e9a143daa26de26b613d44bf218be892d1659218e2c1b6aef1699cd6bb07887eb33d40283b1460a79d0fd33d41ad8f66

    • SSDEEP

      12288:HS6ln+flo/XciMv26Imbb9AeBcJWlnXGGPixW04Q2UL6qd2WaIgn6LE4:yTdCjECmbRAKcsgXjPax6LE4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks