General

  • Target

    7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c.exe

  • Size

    540KB

  • Sample

    240928-bx1w7asdje

  • MD5

    676813934849b161d6dfd5062536318f

  • SHA1

    de400cd5edbf8cb741691f13c338744842c0f1a2

  • SHA256

    7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c

  • SHA512

    0325329d32778625583254222a014c3d9cee7c132c5ecdb132e3fcb0adc97345f9632ded15b294800666a67648d84470b01a564fb234997320f1e6ddab46706e

  • SSDEEP

    6144:+6ej0DdEWMhO7ZiDBqOV2eR05OvP7jXXgC/MVgWJNYRy7nKx9hO+w7wHQ3SZfTUP:+69EWKq6ucPp0VhJvTKviaxoZ

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.emmioglu.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kaya2758+
C2

https://api.telegram.org/bot7793181644:AAGZi9EwhHz_7_W-P3o6zCi0LNG3DYUolRk/sendMessage?chat_id=1645099110

Targets

    • Target

      7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c.exe

    • Size

      540KB

    • MD5

      676813934849b161d6dfd5062536318f

    • SHA1

      de400cd5edbf8cb741691f13c338744842c0f1a2

    • SHA256

      7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c

    • SHA512

      0325329d32778625583254222a014c3d9cee7c132c5ecdb132e3fcb0adc97345f9632ded15b294800666a67648d84470b01a564fb234997320f1e6ddab46706e

    • SSDEEP

      6144:+6ej0DdEWMhO7ZiDBqOV2eR05OvP7jXXgC/MVgWJNYRy7nKx9hO+w7wHQ3SZfTUP:+69EWKq6ucPp0VhJvTKviaxoZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks