General

  • Target

    a8b9db65953cde05c576daf4b32b6088a16b33ac96345c2de1b117fb0922134d

  • Size

    566KB

  • Sample

    241104-w87jbsvdpc

  • MD5

    2f6e38bdda06d7dd6a731732294b4756

  • SHA1

    da8d4fd1246d593a0c607a1aeefd907961993b18

  • SHA256

    a8b9db65953cde05c576daf4b32b6088a16b33ac96345c2de1b117fb0922134d

  • SHA512

    7d74f81e9a39778bbefa6173e3935697144794b66a50a3a15f3f6b9478db1166f8ac66feab273a28e2408a05a33c5618d70c84be5a652737ebd4342ba4f2cfa1

  • SSDEEP

    12288:z5F2GkxEaWZdsBxjdau35jeT1QN2Yc7h/xJjv+kgXtrUkgHUo/q30cdn:NF2GkxEHmBXau35jeT10cpxdv6u3Hgzp

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.skagenships.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    XAqEAz@4

Targets

    • Target

      Transferencia.exe

    • Size

      664KB

    • MD5

      3f6d217364b17266bb888620c490260a

    • SHA1

      12aa2706b4b7a7ceca604ef8e440dfa2ba2925b0

    • SHA256

      ff5c91650db7948dab64599a77241952f1e81dbd10201418c90a1be3f3ec94f1

    • SHA512

      6cc7a8bb4fc0b46778f9a352fdf9e164c730c89a27339a59e1a999efa8bebdf1c265a76e06d9e9bcbcbee02a28145c465071cdd1c5588ccb6cedc58e548a1b82

    • SSDEEP

      12288:uM3ZJLcWeC4b3OuFW1D5jkiUr6Vz9hDTl02YCdhNxJpvgyglrh:LnAOuQ5jZUr+jTQCxxXvnIh

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks