General

  • Target

    083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f.exe

  • Size

    126KB

  • Sample

    241031-cf2ylaxbla

  • MD5

    7e7eed81d6cdbfdbffc813d82883a344

  • SHA1

    83f6991305ea05977e19bf07dbb2a3844045f9bd

  • SHA256

    083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f

  • SHA512

    64f471b3c1ba0b234c19a858fed504a8d9483b156cad12d923a184e12a312a462d1705bd84298aad22a224ce51ae597020386e717d5690b21999003ca8d122b5

  • SSDEEP

    3072:ijoOxu9go/b/1O5iItBEpZNlxoDSrah/F15xN:Mo99bT/1OVtazDxaSuhvz

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    nr!^%FSRH4kX@KM

Targets

    • Target

      083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f.exe

    • Size

      126KB

    • MD5

      7e7eed81d6cdbfdbffc813d82883a344

    • SHA1

      83f6991305ea05977e19bf07dbb2a3844045f9bd

    • SHA256

      083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f

    • SHA512

      64f471b3c1ba0b234c19a858fed504a8d9483b156cad12d923a184e12a312a462d1705bd84298aad22a224ce51ae597020386e717d5690b21999003ca8d122b5

    • SSDEEP

      3072:ijoOxu9go/b/1O5iItBEpZNlxoDSrah/F15xN:Mo99bT/1OVtazDxaSuhvz

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks