General

  • Target

    4183d5786fe2a0e4563c5a0cf57d92f6.bin

  • Size

    527KB

  • Sample

    241024-bpqq9azfqq

  • MD5

    a349328e6cdfeb212a2505eec4a572e5

  • SHA1

    668014cb8157387ab35fe9ccb952bb39c805a5c9

  • SHA256

    f3417f98d7feb3902bd789aabbb47155800665e5b5009c8941eab4f986255648

  • SHA512

    c75484e40b20c37936b7e29ad6033b4143b800562009fe6d570a71c036ca7587254ab16908f7b0aa9e760f3cd5bed576b28dc9eaf568bd875e2b080589fc8ac8

  • SSDEEP

    12288:0XhMCs4fj8cl3OVAARetiViD+pZR5p++XGCo3UsVfuhtSf/xuq91i2wR:067qj8cBOVAdtMB95w+Ho3Xnf9x6

Malware Config

Extracted

Family

snakekeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mgcconstrucciones.com.co
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Mgonzalez@2021.

Targets

    • Target

      d7439af0827a632fe9730a7dd2585a2fb5b0af71c312cdeb49e6a738a9133400.exe

    • Size

      539KB

    • MD5

      4183d5786fe2a0e4563c5a0cf57d92f6

    • SHA1

      2fc414de34b92a56712c6684c84af970037b81f5

    • SHA256

      d7439af0827a632fe9730a7dd2585a2fb5b0af71c312cdeb49e6a738a9133400

    • SHA512

      8d86235c4d4060d656a1a2349a43e7ddfc9d036d476dbf8b9d404af060b754eb33bdc74ee03881f769fd19a60b87daefc696e48ee33f40b1e24f358dfe9a87fc

    • SSDEEP

      12288:DMq47lWuTq/3dOxotjTps+ZHmkHN3HiPCpfBVxe:I/WuTsoWt1HnHpHiwVI

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks