General

  • Target

    31cb9f5772c67c4b6a107fa6d6a3b04a7ae6dc11fd8dbbaf5612551be7c76ea3.exe

  • Size

    768KB

  • Sample

    240905-wh2kdsxbpa

  • MD5

    f30d3f2bd394561f2b92d2f27a9ccb77

  • SHA1

    4fa937965d2c736480deff512460851f222516f6

  • SHA256

    31cb9f5772c67c4b6a107fa6d6a3b04a7ae6dc11fd8dbbaf5612551be7c76ea3

  • SHA512

    a634adfadf418f8c1d85b02090854d2655426dd146b5d9430da239d607d367fc8b4de17e2f1c7844aa0fc258119efee2f15749bf7622ee8e77267469ef4f6ce9

  • SSDEEP

    12288:CsHzOUNUSB/o5LsI1uwajJ5yvv1l2yPj2PrzrECC7DlkxcB:ViUmSB/o5d1ubcvhPKTzrECekSB

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.decoriumtel.top
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    5+H*kQ{nwfUf

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.decoriumtel.top
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    5+H*kQ{nwfUf

Targets

    • Target

      31cb9f5772c67c4b6a107fa6d6a3b04a7ae6dc11fd8dbbaf5612551be7c76ea3.exe

    • Size

      768KB

    • MD5

      f30d3f2bd394561f2b92d2f27a9ccb77

    • SHA1

      4fa937965d2c736480deff512460851f222516f6

    • SHA256

      31cb9f5772c67c4b6a107fa6d6a3b04a7ae6dc11fd8dbbaf5612551be7c76ea3

    • SHA512

      a634adfadf418f8c1d85b02090854d2655426dd146b5d9430da239d607d367fc8b4de17e2f1c7844aa0fc258119efee2f15749bf7622ee8e77267469ef4f6ce9

    • SSDEEP

      12288:CsHzOUNUSB/o5LsI1uwajJ5yvv1l2yPj2PrzrECC7DlkxcB:ViUmSB/o5d1ubcvhPKTzrECekSB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks