General

  • Target

    contract.exe

  • Size

    522KB

  • Sample

    231128-hk9rwsga21

  • MD5

    721e61ae010bd0e683bda80e28b977ae

  • SHA1

    f2d3cbe4c62f632eff574c3816a231d40ab0fdfa

  • SHA256

    7ea4a70d11f9b347dc1130489ca32322875d587f11963d3b8c6e8583eac113b7

  • SHA512

    9a853f4c31a1700c59214ec784d4514f7d5204aec12bbd02f7f3517dd8dd0e5cb94a37e5b96a7c70535aba31d1835b52c32737a7f8ea3f169bbec76c0d955fb2

  • SSDEEP

    12288:Ap0CQmbCp8HBSR67V2xEbJ8Wp/sUCw6n8Ki70vspK:BsPaUCw68PQu

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mct2.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    00000

Targets

    • Target

      contract.exe

    • Size

      522KB

    • MD5

      721e61ae010bd0e683bda80e28b977ae

    • SHA1

      f2d3cbe4c62f632eff574c3816a231d40ab0fdfa

    • SHA256

      7ea4a70d11f9b347dc1130489ca32322875d587f11963d3b8c6e8583eac113b7

    • SHA512

      9a853f4c31a1700c59214ec784d4514f7d5204aec12bbd02f7f3517dd8dd0e5cb94a37e5b96a7c70535aba31d1835b52c32737a7f8ea3f169bbec76c0d955fb2

    • SSDEEP

      12288:Ap0CQmbCp8HBSR67V2xEbJ8Wp/sUCw6n8Ki70vspK:BsPaUCw68PQu

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks