General

  • Target

    668e30794599e3cc195cd9cb6a1110ecdf5f8c947b441132c5044b5d3b41c05d

  • Size

    46KB

  • Sample

    240417-p1xwlafg55

  • MD5

    875735b3086231fb83adef571598116b

  • SHA1

    3887c3ebfa1891661f628ebc70ebe308b9093fbf

  • SHA256

    668e30794599e3cc195cd9cb6a1110ecdf5f8c947b441132c5044b5d3b41c05d

  • SHA512

    4f7a22420c93ea0351d41b08dd6ae8d66efd70e8105dd1db45302a1910a1f0af6913d83659ce008e6b554a68c5625bd84dcf78f7268d7901100d71e3f2767b75

  • SSDEEP

    768:rdmf8CAL/RVuV2SqpsM6/7p+6BJp0X/+efclOd8hatLaTdh2AjhDEh1uBc:wGdS/Ui9+6SZfcYDt5AjhDcuBc

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.stpgig.com
  • Port:
    587
  • Username:
    info@stpgig.com
  • Password:
    Stpgig#Login21
C2

https://scratchdreams.tk

Targets

    • Target

      461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe

    • Size

      129KB

    • MD5

      ccfdbf07643aed4c333fad91828e4a80

    • SHA1

      ccb1efa6c2ef21eb912bfdabb9a6bccb374dc248

    • SHA256

      461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e

    • SHA512

      c9bd1a9ac30e941eae5acf39cff6c6b0ac8a95e7bd0c656496851f15fcce345f4cf0371df6aad709c4f72845ad496291a70d9364572abdd8da0d7444f385b6c7

    • SSDEEP

      3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3mDbY:VpmNZMm7Lqbfcb30b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks