General

  • Target

    12042024_2035_12042024_SHD098656789000.pdf.uu

  • Size

    39KB

  • Sample

    240412-pssxnsdd9x

  • MD5

    8be1bc384f57ad68f50027c6135e6da4

  • SHA1

    bdd9d3e38236f01cd8361d6da43f6a8888beaa28

  • SHA256

    e3d9eaa19def39e08d449fa3a4e944681abf26e50c1afa3df043b90d18cac689

  • SHA512

    96cba8a8a13842639604a49c23c0ee8bbffc2e2cb0c8acc6ddca90a6484903fbc7dab2a6d63bfd5b9aea793843d27c1a7cd0c1c53acb6e635d9f572166086143

  • SSDEEP

    768:wEKXhgkJHn+z5w4iWrQ8x93DNrbXutigfAWCyVQkoEiw1C1Kx/IWo/szOXmS48QE:wEK2kJHny+yQ8xdDNR4RONjw1Cc/Ix6a

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.daipro.com.mx
  • Port:
    587
  • Username:
    contabilidad@daipro.com.mx
  • Password:
    DAIpro123**
  • Email To:
    saleseuropower1@yandex.com
C2

https://scratchdreams.tk

Targets

    • Target

      SHD098656789000.cmd

    • Size

      96KB

    • MD5

      457c95b461b3b1c468660483c62042dd

    • SHA1

      a2eeb39b7032d0237001839296ef8034549eddf8

    • SHA256

      ca8997fe1d8d8fc50a30c511b4cef998fc6dcc3e4547735c55808ad9e02bc588

    • SHA512

      40ab2425547ff9b8440eb25ed10b66569c1cb10b0331e32e21126a7907fe68b52edeb73979e55645269dcd26010ad82cc55efa7fef72d54b3a530c9f41eb5853

    • SSDEEP

      1536:liWQjfI3Uyqu9egnHl+HK6R9THt+8bqM8T1kLH:llQ4Tqu9egnHMKU9TWM8TYH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks