General

  • Target

    NEAS.6e1277ea70af2c91d96c59af4a71f64a7b1a6633687919a347c570610c578066exe_JC.exe

  • Size

    610KB

  • Sample

    231024-ytal6ahf3s

  • MD5

    607e77f9ca12ba956cb67200c50d4af7

  • SHA1

    2ab62a18b91f49aeabbba8d95c6df254b1d8fca8

  • SHA256

    6e1277ea70af2c91d96c59af4a71f64a7b1a6633687919a347c570610c578066

  • SHA512

    e1f891da4ee8966ff7def571d4cedf609f2e087b50c29ec9a062dc4a8a452ee7a3650d251e5a2188490bb27b0a2681eed441750ad9d42d644a081324668dddb3

  • SSDEEP

    12288:7MqkMPgR/mZRM+BN3SscBiUSnYpJLNRPPD4KUQbwEldtpoj:RgkZR533ToBBfPMNQUEQ

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gkas.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gkasteknik@2022

Targets

    • Target

      NEAS.6e1277ea70af2c91d96c59af4a71f64a7b1a6633687919a347c570610c578066exe_JC.exe

    • Size

      610KB

    • MD5

      607e77f9ca12ba956cb67200c50d4af7

    • SHA1

      2ab62a18b91f49aeabbba8d95c6df254b1d8fca8

    • SHA256

      6e1277ea70af2c91d96c59af4a71f64a7b1a6633687919a347c570610c578066

    • SHA512

      e1f891da4ee8966ff7def571d4cedf609f2e087b50c29ec9a062dc4a8a452ee7a3650d251e5a2188490bb27b0a2681eed441750ad9d42d644a081324668dddb3

    • SSDEEP

      12288:7MqkMPgR/mZRM+BN3SscBiUSnYpJLNRPPD4KUQbwEldtpoj:RgkZR533ToBBfPMNQUEQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks