General

  • Target

    QUOTATION_SEPQTRA071244úPDF.scr.exe

  • Size

    497KB

  • Sample

    240922-rcpanatajn

  • MD5

    60fdae7957c24a52dcb84aa1802edbd4

  • SHA1

    4f38d0c6f43e8d6efaa6d4355d563213b0cf6866

  • SHA256

    6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676

  • SHA512

    9367458d72ba32b3e0542c94afc0ea6f3cf5c5fcbb17f45cac917ea1f35225292de9185a8b5df60e6bb43047c4546c638489addc41db4f052094224b053057fc

  • SSDEEP

    1536:CH8HxsM08Tcgc92csCGlTyzUuZ0SVPRiNaQnFYUHKa/GUkgGPYSLgVay+Zm1SMhf:PZGmtFfqgOYSLgf+ZmRvV5FPV

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Zg^!Zy[?IKrs99@soltan

Targets

    • Target

      QUOTATION_SEPQTRA071244úPDF.scr.exe

    • Size

      497KB

    • MD5

      60fdae7957c24a52dcb84aa1802edbd4

    • SHA1

      4f38d0c6f43e8d6efaa6d4355d563213b0cf6866

    • SHA256

      6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676

    • SHA512

      9367458d72ba32b3e0542c94afc0ea6f3cf5c5fcbb17f45cac917ea1f35225292de9185a8b5df60e6bb43047c4546c638489addc41db4f052094224b053057fc

    • SSDEEP

      1536:CH8HxsM08Tcgc92csCGlTyzUuZ0SVPRiNaQnFYUHKa/GUkgGPYSLgVay+Zm1SMhf:PZGmtFfqgOYSLgf+ZmRvV5FPV

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks