General

  • Target

    461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe

  • Size

    129KB

  • Sample

    240408-qkhbmsaa78

  • MD5

    ccfdbf07643aed4c333fad91828e4a80

  • SHA1

    ccb1efa6c2ef21eb912bfdabb9a6bccb374dc248

  • SHA256

    461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e

  • SHA512

    c9bd1a9ac30e941eae5acf39cff6c6b0ac8a95e7bd0c656496851f15fcce345f4cf0371df6aad709c4f72845ad496291a70d9364572abdd8da0d7444f385b6c7

  • SSDEEP

    3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3mDbY:VpmNZMm7Lqbfcb30b

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.stpgig.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Stpgig#Login21
C2

https://scratchdreams.tk

Targets

    • Target

      461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe

    • Size

      129KB

    • MD5

      ccfdbf07643aed4c333fad91828e4a80

    • SHA1

      ccb1efa6c2ef21eb912bfdabb9a6bccb374dc248

    • SHA256

      461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e

    • SHA512

      c9bd1a9ac30e941eae5acf39cff6c6b0ac8a95e7bd0c656496851f15fcce345f4cf0371df6aad709c4f72845ad496291a70d9364572abdd8da0d7444f385b6c7

    • SSDEEP

      3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3mDbY:VpmNZMm7Lqbfcb30b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks