General

  • Target

    a7973a17712bb6def98c296393e3161073714539744d2b0f6e7b115fe8f05128N

  • Size

    361KB

  • Sample

    240927-mqyc9syclj

  • MD5

    787ea6002e86cb8b3c7b4a4c0060c500

  • SHA1

    017ac6ff804196bb686fa0c73ca6a4766b6f555b

  • SHA256

    a7973a17712bb6def98c296393e3161073714539744d2b0f6e7b115fe8f05128

  • SHA512

    a095742146b74732ca8e55ae376da3b0bb40ae18f9c19beba73649ae45bbcea5495811f3e34270b68e583921b7ce52355b9370023cdfd3f79d592d503f2bdb9b

  • SSDEEP

    3072:m1Did/y4BPIqk2gh6iP40nP05w+VYuyZ:qid/9V

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Zg^!Zy[?IKrs99@soltan

Targets

    • Target

      a7973a17712bb6def98c296393e3161073714539744d2b0f6e7b115fe8f05128N

    • Size

      361KB

    • MD5

      787ea6002e86cb8b3c7b4a4c0060c500

    • SHA1

      017ac6ff804196bb686fa0c73ca6a4766b6f555b

    • SHA256

      a7973a17712bb6def98c296393e3161073714539744d2b0f6e7b115fe8f05128

    • SHA512

      a095742146b74732ca8e55ae376da3b0bb40ae18f9c19beba73649ae45bbcea5495811f3e34270b68e583921b7ce52355b9370023cdfd3f79d592d503f2bdb9b

    • SSDEEP

      3072:m1Did/y4BPIqk2gh6iP40nP05w+VYuyZ:qid/9V

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks