General

  • Target

    QUOTATION_OCTQTRA071244·PDF.scr.exe

  • Size

    92KB

  • Sample

    241028-pzl3psxmaw

  • MD5

    5ab07a2800291bd5cabc6ccaef82e20b

  • SHA1

    ba5c41ee66a9e9be480db7f828ba6a63fcc50bc6

  • SHA256

    6c403516d322330a43a884229831078dfcadf76a81e77061f14b5de698efa071

  • SHA512

    addc42a5a915be017e876a167e73a97599aed6032ef118adcd4c91a2438a6ed7b6b67c1de6d9919f330c1bd76f7e6c87a89321da57471111f505bd879f41f7e6

  • SSDEEP

    1536:l1vFCBuAbdw2pfoqZOLqkJsbxMuLql1UzBDiKp5TsaaXtqy:HvFCBlb3pfoqZOLqkJyiGBDiGJOqy

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD6EwDq*nF

Targets

    • Target

      QUOTATION_OCTQTRA071244·PDF.scr.exe

    • Size

      92KB

    • MD5

      5ab07a2800291bd5cabc6ccaef82e20b

    • SHA1

      ba5c41ee66a9e9be480db7f828ba6a63fcc50bc6

    • SHA256

      6c403516d322330a43a884229831078dfcadf76a81e77061f14b5de698efa071

    • SHA512

      addc42a5a915be017e876a167e73a97599aed6032ef118adcd4c91a2438a6ed7b6b67c1de6d9919f330c1bd76f7e6c87a89321da57471111f505bd879f41f7e6

    • SSDEEP

      1536:l1vFCBuAbdw2pfoqZOLqkJsbxMuLql1UzBDiKp5TsaaXtqy:HvFCBlb3pfoqZOLqkJyiGBDiGJOqy

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks