General

  • Target

    SecuriteInfo.com.Win32.KeyloggerX-gen.24670.4764.exe

  • Size

    418KB

  • Sample

    231025-d2hbradg57

  • MD5

    c9af48797367146725c1355060ad6733

  • SHA1

    9a0e59f47659ac02f92ea9d287f6d6dbbc65a4c2

  • SHA256

    f347fc090da11031ce00a0a7fb7330c37c921422939e54d8df7202487f3c15c2

  • SHA512

    68f226bff322257c8a5721989547837d6a8bf5150eb25e91f5012879f9f663fe0007506288927a484c06b69c69e354db67bd4f05d3e8bab9e7c7cf2c254e8ef6

  • SSDEEP

    6144:R/2WTS7RXwn5F8lwOazRkY/loOHO4jUDE2EteYOtYYE2Odtyqd72fJ:RuYF8lwOazxloAqFEtZlYrOiqo

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hahcd.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    d5ClGOqbU6HU

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SecuriteInfo.com.Win32.KeyloggerX-gen.24670.4764.exe

    • Size

      418KB

    • MD5

      c9af48797367146725c1355060ad6733

    • SHA1

      9a0e59f47659ac02f92ea9d287f6d6dbbc65a4c2

    • SHA256

      f347fc090da11031ce00a0a7fb7330c37c921422939e54d8df7202487f3c15c2

    • SHA512

      68f226bff322257c8a5721989547837d6a8bf5150eb25e91f5012879f9f663fe0007506288927a484c06b69c69e354db67bd4f05d3e8bab9e7c7cf2c254e8ef6

    • SSDEEP

      6144:R/2WTS7RXwn5F8lwOazRkY/loOHO4jUDE2EteYOtYYE2Odtyqd72fJ:RuYF8lwOazxloAqFEtZlYrOiqo

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks