General

  • Target

    4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp

  • Size

    144KB

  • Sample

    241106-tbpk5stdkk

  • MD5

    38ce2ccaaf5f654792068f427d9a16d3

  • SHA1

    5fbfaefcbc0f0211a6428cb442245d979f459d01

  • SHA256

    d63ecfb4ce224ed9a4862402b65f72d406ea7973ae6cf4857294ab0db2298c88

  • SHA512

    678229d3cb74056e114c984a3f2c5caa7cb1a210ee2e1c25e3860ae85b0dba20c58e52eafedff74fc6b6c4108803038b4105696828646d7046353e82c6cf7ef0

  • SSDEEP

    3072:k8asEqyUoO1H/IyCvjQEJ0vDbbs2QJsYXwv8YvDbY:jEqyUL1H/XbbyO7b

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    D#Hm!GgJ,?fO;gfR

Targets

    • Target

      4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp

    • Size

      144KB

    • MD5

      38ce2ccaaf5f654792068f427d9a16d3

    • SHA1

      5fbfaefcbc0f0211a6428cb442245d979f459d01

    • SHA256

      d63ecfb4ce224ed9a4862402b65f72d406ea7973ae6cf4857294ab0db2298c88

    • SHA512

      678229d3cb74056e114c984a3f2c5caa7cb1a210ee2e1c25e3860ae85b0dba20c58e52eafedff74fc6b6c4108803038b4105696828646d7046353e82c6cf7ef0

    • SSDEEP

      3072:k8asEqyUoO1H/IyCvjQEJ0vDbbs2QJsYXwv8YvDbY:jEqyUL1H/XbbyO7b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks