General

  • Target

    646fd5b974819efcae46bdf885fbbe8659e3564cfd714fb0b30dd5d765aae6fc.unknown

  • Size

    40KB

  • Sample

    241029-cwd7gatarl

  • MD5

    9b9d97873b452f64ae4f4ad88ece6341

  • SHA1

    242ddef5b5cbf4b9bb21b627541fb6530266a44c

  • SHA256

    646fd5b974819efcae46bdf885fbbe8659e3564cfd714fb0b30dd5d765aae6fc

  • SHA512

    5df963bccc186fd5854b4b0f78ba65155a7c3ae77d935961dddaec741122661b70cf905b4030bd1e0d0a5def778c36606674c38afaa54be3aefbe7ed5692f02b

  • SSDEEP

    768:AHG+A9QMh1DAcUedHALT1m1Tlfv4U6LQIrDkHYnq4mEXM/Hl+pJl:Am+ASWDb2YFV554KYnzmE8/Hl+pJl

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD6EwDq*nF

Targets

    • Target

      QUOTATION_OCTQTRA071244PDF.scr

    • Size

      92KB

    • MD5

      5ab07a2800291bd5cabc6ccaef82e20b

    • SHA1

      ba5c41ee66a9e9be480db7f828ba6a63fcc50bc6

    • SHA256

      6c403516d322330a43a884229831078dfcadf76a81e77061f14b5de698efa071

    • SHA512

      addc42a5a915be017e876a167e73a97599aed6032ef118adcd4c91a2438a6ed7b6b67c1de6d9919f330c1bd76f7e6c87a89321da57471111f505bd879f41f7e6

    • SSDEEP

      1536:l1vFCBuAbdw2pfoqZOLqkJsbxMuLql1UzBDiKp5TsaaXtqy:HvFCBlb3pfoqZOLqkJyiGBDiGJOqy

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks