General

  • Target

    RFQ inquiry.exe

  • Size

    941KB

  • Sample

    241029-k1azlstfnd

  • MD5

    5f39ff8eb18d507a7840e92843128c4f

  • SHA1

    5e7dfa31f6e5fc2fce67d90c2c443a5ba39eff47

  • SHA256

    104b03184545f071062aabafdc21afcd244c3d015fc42e701bb0db5861ccc072

  • SHA512

    0fdbf4427f1737f92a35c099dc64b465aa98639b5b0bc79efbdd6392adbacd5aece58d15c0f9d98e3ab9e824451d503fedabc264948d42813997408018b41260

  • SSDEEP

    12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLodwQpkAIe6Soo3vCVI5btrI:ffmMv6Ckr7Mny5QLSbIe6SoeCcbtrI

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.financ-fire.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    W6otxNGOdwF9

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      RFQ inquiry.exe

    • Size

      941KB

    • MD5

      5f39ff8eb18d507a7840e92843128c4f

    • SHA1

      5e7dfa31f6e5fc2fce67d90c2c443a5ba39eff47

    • SHA256

      104b03184545f071062aabafdc21afcd244c3d015fc42e701bb0db5861ccc072

    • SHA512

      0fdbf4427f1737f92a35c099dc64b465aa98639b5b0bc79efbdd6392adbacd5aece58d15c0f9d98e3ab9e824451d503fedabc264948d42813997408018b41260

    • SSDEEP

      12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLodwQpkAIe6Soo3vCVI5btrI:ffmMv6Ckr7Mny5QLSbIe6SoeCcbtrI

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks