General

  • Target

    114fc5f4853d2b5bfeeb8c84e0b6f0d29e71fbcfcca3fb46be8b6169acdbca3b.z

  • Size

    81KB

  • Sample

    241107-cjzmmstclr

  • MD5

    c8daf681fbdecdb291913e0989bfb255

  • SHA1

    5c9d7e65779c8e0f040c07bb965d91ce48db90f8

  • SHA256

    114fc5f4853d2b5bfeeb8c84e0b6f0d29e71fbcfcca3fb46be8b6169acdbca3b

  • SHA512

    3b29bff0916ef24ef46115a8af8e81da90351d148ada7f41c54e56fec154158f39f79933a1201a2ae3de9c3f522c60b9ac882848a5d88268ef5da67e24fd1b8b

  • SSDEEP

    1536:lSA/crRGaKk9vkVMShLe96itSHyJolzQ2VwoRQmsd1DugweMmH:lV/clGaKUkVMSVybSHUgzQbomx1DuleZ

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD@N*]*nF

Targets

    • Target

      QUOTATION_NOVQTRA071244PDF.scr

    • Size

      170KB

    • MD5

      d2f5552955ff07429b7218f4a4008cfc

    • SHA1

      56b59a77d25773d341aec87d268db3cde8649ea5

    • SHA256

      8f2049d7defe36c3970dc16ba924cc268cac0f9474ff5aca8d692d2b2b961726

    • SHA512

      94e14f03d068d8b3e9208aab419d86077524e0c1dc2fab924951aa1f26738fc1b470940056f1ca15acbf65028a1ccf43c0cadc7a538f2597c88eb32c173f4a6c

    • SSDEEP

      3072:EP95ONHGTxjx6CHj1GVUyZbdB8Ky48H95rnyPDtq4/tSpWA7HpguwC6gUd5:El5OexPjVFnSL1S4AzpguwC2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks