General

  • Target

    b82e41ff47a84abf4995b74382c70bbe8190f19173a4f8d6006f8cb952f68c97_JC.exe

  • Size

    126KB

  • Sample

    231003-sbwh1scc2z

  • MD5

    bb2040e262a906cdd553a14bfdf69c83

  • SHA1

    8be60fa020cea2dd37ae876e9e6e0b571e04fd50

  • SHA256

    b82e41ff47a84abf4995b74382c70bbe8190f19173a4f8d6006f8cb952f68c97

  • SHA512

    2b91adc5c134d4e32e3a95bacda1da59c1aaea05842e02c4bd9526c5cc1193094bca657423a8b926108021f2aa03e321379c39280bf80633b15788f722e3d5eb

  • SSDEEP

    3072:7ALhE1U1mv5C425pqikR3b7t+jfwBlTx1gbY:JchEJ5bwUxWb

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.royalcheckout.store/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    575K5(MaZro2575K5(MaZro2

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.royalcheckout.store
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    575K5(MaZro2575K5(MaZro2

Targets

    • Target

      b82e41ff47a84abf4995b74382c70bbe8190f19173a4f8d6006f8cb952f68c97_JC.exe

    • Size

      126KB

    • MD5

      bb2040e262a906cdd553a14bfdf69c83

    • SHA1

      8be60fa020cea2dd37ae876e9e6e0b571e04fd50

    • SHA256

      b82e41ff47a84abf4995b74382c70bbe8190f19173a4f8d6006f8cb952f68c97

    • SHA512

      2b91adc5c134d4e32e3a95bacda1da59c1aaea05842e02c4bd9526c5cc1193094bca657423a8b926108021f2aa03e321379c39280bf80633b15788f722e3d5eb

    • SSDEEP

      3072:7ALhE1U1mv5C425pqikR3b7t+jfwBlTx1gbY:JchEJ5bwUxWb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks