General

  • Target

    15155019639dfcbdd4415c563bdaef06.bin

  • Size

    282KB

  • Sample

    231021-bgna6ace81

  • MD5

    7cad5a2d447fa8bf1b8eb4dbe14afa47

  • SHA1

    4b5532f7e92dc5a6ef96bc63743eeee52e992f0d

  • SHA256

    148a314b5495079f75fb30c0f4e75d086c26afe9c0fa9bbc25a0d984a1615848

  • SHA512

    dc9a806674c141e77d58684a34732a8db6422635a18afa2f737199586dc81a2126f05491096c8922433c2190f1de9e161bfd13b452fb2cb3657dc0928cd2351d

  • SSDEEP

    6144:83faObVgoDEviCCkC32PQJk+YzzdWiqlK0pts31o1wzxtqCGRZ:IfaObDEdPCmYAdCKesFoezxcCGRZ

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hahcd.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    d5ClGOqbU6HU

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      9734c8dcfd274b038523356935eadc3ff4f7c4b71542def7926f723d0872ca0b.exe

    • Size

      367KB

    • MD5

      15155019639dfcbdd4415c563bdaef06

    • SHA1

      ee1fb7361bc4028d50eaff2465ba09b06a5fb44e

    • SHA256

      9734c8dcfd274b038523356935eadc3ff4f7c4b71542def7926f723d0872ca0b

    • SHA512

      20b879bbc544727af1ea9d9c8acf14edf79de419604ea2f149686c663ff43e62d933174d02b2dea142cccd4023cc6dcf0759a0c5b6eb137f9bb27edd148a3e35

    • SSDEEP

      6144:Rcc4OazRkbkJNIa4MlaHswjX9o8ReYOtYYE2Odtyqd72fOsA:W1OazqkJP4ZfX9tZlYrOiqoo

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks