General

  • Target

    PR # 3000005991 - Quotation Required.exe

  • Size

    1.0MB

  • Sample

    240809-qszwnavekd

  • MD5

    a367a9d548befb868f0c6aac5bc49c3c

  • SHA1

    0349361a3222207197f30ea67de2560b49531d69

  • SHA256

    e71b1065a4b1b0fc1174cecf0963797fd2cb8a0dc4d0b5e7166ecc8722071bee

  • SHA512

    15ef7d731b1e499c0289c255596908c205abdcc5b754ec4c185235780ab99b5072e94b3db8eb65dfa2127108643f51572413856e989b1200218595b8685a7e18

  • SSDEEP

    24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaYogZrz5:qh+ZkldoPK8YaYom

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cash@com12345

Targets

    • Target

      PR # 3000005991 - Quotation Required.exe

    • Size

      1.0MB

    • MD5

      a367a9d548befb868f0c6aac5bc49c3c

    • SHA1

      0349361a3222207197f30ea67de2560b49531d69

    • SHA256

      e71b1065a4b1b0fc1174cecf0963797fd2cb8a0dc4d0b5e7166ecc8722071bee

    • SHA512

      15ef7d731b1e499c0289c255596908c205abdcc5b754ec4c185235780ab99b5072e94b3db8eb65dfa2127108643f51572413856e989b1200218595b8685a7e18

    • SSDEEP

      24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaYogZrz5:qh+ZkldoPK8YaYom

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks