General

  • Target

    f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba.exe

  • Size

    130KB

  • Sample

    240603-rhmzsaad88

  • MD5

    904c56a013a3ab2747d436bce1f7727d

  • SHA1

    4373b0f97602d459dd7580b3452d37924be48c2d

  • SHA256

    f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba

  • SHA512

    7467f6573e79d7afdfb59bc1ec7767b0d408de2c5407205973c4b360e54e669a3c7fc9decf3c67f12498708d9f26a9a39e013f1f0dc71bd7ba6762f48db59b8b

  • SSDEEP

    3072:fZHRYTcxL41EAamulCfiJtX1b0j9lrCwvHx0fgbY:3YTcR41REV1bu04b

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51
C2

http://103.130.147.85

Targets

    • Target

      f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba.exe

    • Size

      130KB

    • MD5

      904c56a013a3ab2747d436bce1f7727d

    • SHA1

      4373b0f97602d459dd7580b3452d37924be48c2d

    • SHA256

      f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba

    • SHA512

      7467f6573e79d7afdfb59bc1ec7767b0d408de2c5407205973c4b360e54e669a3c7fc9decf3c67f12498708d9f26a9a39e013f1f0dc71bd7ba6762f48db59b8b

    • SSDEEP

      3072:fZHRYTcxL41EAamulCfiJtX1b0j9lrCwvHx0fgbY:3YTcR41REV1bu04b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks