General

  • Target

    SecuriteInfo.com.Trojan.DownLoader46.24845.10216.20698.exe

  • Size

    367KB

  • Sample

    231019-qznrzagc4s

  • MD5

    15155019639dfcbdd4415c563bdaef06

  • SHA1

    ee1fb7361bc4028d50eaff2465ba09b06a5fb44e

  • SHA256

    9734c8dcfd274b038523356935eadc3ff4f7c4b71542def7926f723d0872ca0b

  • SHA512

    20b879bbc544727af1ea9d9c8acf14edf79de419604ea2f149686c663ff43e62d933174d02b2dea142cccd4023cc6dcf0759a0c5b6eb137f9bb27edd148a3e35

  • SSDEEP

    6144:Rcc4OazRkbkJNIa4MlaHswjX9o8ReYOtYYE2Odtyqd72fOsA:W1OazqkJP4ZfX9tZlYrOiqoo

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hahcd.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    d5ClGOqbU6HU

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SecuriteInfo.com.Trojan.DownLoader46.24845.10216.20698.exe

    • Size

      367KB

    • MD5

      15155019639dfcbdd4415c563bdaef06

    • SHA1

      ee1fb7361bc4028d50eaff2465ba09b06a5fb44e

    • SHA256

      9734c8dcfd274b038523356935eadc3ff4f7c4b71542def7926f723d0872ca0b

    • SHA512

      20b879bbc544727af1ea9d9c8acf14edf79de419604ea2f149686c663ff43e62d933174d02b2dea142cccd4023cc6dcf0759a0c5b6eb137f9bb27edd148a3e35

    • SSDEEP

      6144:Rcc4OazRkbkJNIa4MlaHswjX9o8ReYOtYYE2Odtyqd72fOsA:W1OazqkJP4ZfX9tZlYrOiqoo

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks