General

  • Target

    f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e.exe

  • Size

    1.1MB

  • Sample

    240906-cefzqszell

  • MD5

    ee42283ee642860f25d8e20a5717882b

  • SHA1

    97b007747754d6018b531106030cb24d6d84fa87

  • SHA256

    f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e

  • SHA512

    fea04ec4d5060bf267b93fd1094b673178d549836071e201b045fd072af1c55c91c53d997810b4294d36bc59a00fa3eea662edf10c13fb96b40652028f0fa7f9

  • SSDEEP

    24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8abk23dVMfy:eTvC/MTQYxsWR7ablo

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.viertechindonesia.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    viertechga46

Targets

    • Target

      f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e.exe

    • Size

      1.1MB

    • MD5

      ee42283ee642860f25d8e20a5717882b

    • SHA1

      97b007747754d6018b531106030cb24d6d84fa87

    • SHA256

      f98b8c6be528239e0ebe3622dadb5157e823089ab9b6b24b64a6282de1e9f38e

    • SHA512

      fea04ec4d5060bf267b93fd1094b673178d549836071e201b045fd072af1c55c91c53d997810b4294d36bc59a00fa3eea662edf10c13fb96b40652028f0fa7f9

    • SSDEEP

      24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8abk23dVMfy:eTvC/MTQYxsWR7ablo

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks