General

  • Target

    13639cd4d36be79a9f7df29a82e3c70893fcefea19be10988b990430d27a9c74

  • Size

    598KB

  • Sample

    240911-tg9hhazeld

  • MD5

    3c06569acefd4cf9c0496ed3e018101c

  • SHA1

    e819017c32806cc401c428c297494cf7914c4bfa

  • SHA256

    13639cd4d36be79a9f7df29a82e3c70893fcefea19be10988b990430d27a9c74

  • SHA512

    335ece6ef62d21d199dcc8d9496e0d977184f1103fd4960305485d97641a6da5f713d91c534a1fc4343a9797a95a88b6ede62be50ceaf34fb7c95805c8991d92

  • SSDEEP

    12288:M4pf2kfwXUGrOFlxUFHRaLAodo4nqg99jhaJicymiq5GYGLCcWfQRX6HQYarJ:MYflfReOFlxuxyWFg99taJicWqaWq6oJ

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.skagenships.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    XAqEAz@4

Targets

    • Target

      Confirmacin de cuenta.pdf.exe

    • Size

      1.0MB

    • MD5

      314f72c3dfcb5075b2311ff757a79e94

    • SHA1

      7b9db33098e5a14ca958224bb68ccc7ed6449727

    • SHA256

      22858e8bcefe8c6d4099ee3a798758815b8f398c7c19c0be6156abec597c49a3

    • SHA512

      60d93f9c471797c608ca55d1d992efe43962fbe341786bb67aac856f1716c0249eec7c416542a2cc565ea967591bb012e7e16b510c1b333bfa360df883432ad4

    • SSDEEP

      24576:i4lavt0LkLL9IMixoEgeazDWU6UNq9MmCS:Vkwkn9IMHeazdaPCS

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks