General

  • Target

    NEAS.b7396095e008ad0155c5ca1ec15b3febd04ce95db7ce45b217ecc463f4d95c68exe_JC.exe

  • Size

    630KB

  • Sample

    231103-w11e2sgb7z

  • MD5

    c122c9a2e83a500fbb318a549ae074c2

  • SHA1

    7b77810d4dfcf8659de758a67c3b35731bbc9049

  • SHA256

    b7396095e008ad0155c5ca1ec15b3febd04ce95db7ce45b217ecc463f4d95c68

  • SHA512

    1b2a45b728acbf4f8c7a9d4503f64214d1f2044287189cad9b728c8d9058f52dc2b188f13eaba47282442773297cd2b3afb751f923e8e120a6ac76b8f9c0ee8b

  • SSDEEP

    12288:oq2XB60q0dOKymxRNIMXt3ixK5py6fL/zwicoam:oqo6w9ymxRJd3i2py6bzj

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mct2.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    00000

Targets

    • Target

      NEAS.b7396095e008ad0155c5ca1ec15b3febd04ce95db7ce45b217ecc463f4d95c68exe_JC.exe

    • Size

      630KB

    • MD5

      c122c9a2e83a500fbb318a549ae074c2

    • SHA1

      7b77810d4dfcf8659de758a67c3b35731bbc9049

    • SHA256

      b7396095e008ad0155c5ca1ec15b3febd04ce95db7ce45b217ecc463f4d95c68

    • SHA512

      1b2a45b728acbf4f8c7a9d4503f64214d1f2044287189cad9b728c8d9058f52dc2b188f13eaba47282442773297cd2b3afb751f923e8e120a6ac76b8f9c0ee8b

    • SSDEEP

      12288:oq2XB60q0dOKymxRNIMXt3ixK5py6fL/zwicoam:oqo6w9ymxRJd3i2py6bzj

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks