General

  • Target

    8f2049d7defe36c3970dc16ba924cc268cac0f9474ff5aca8d692d2b2b961726.exe

  • Size

    170KB

  • Sample

    241107-dapazssphv

  • MD5

    d2f5552955ff07429b7218f4a4008cfc

  • SHA1

    56b59a77d25773d341aec87d268db3cde8649ea5

  • SHA256

    8f2049d7defe36c3970dc16ba924cc268cac0f9474ff5aca8d692d2b2b961726

  • SHA512

    94e14f03d068d8b3e9208aab419d86077524e0c1dc2fab924951aa1f26738fc1b470940056f1ca15acbf65028a1ccf43c0cadc7a538f2597c88eb32c173f4a6c

  • SSDEEP

    3072:EP95ONHGTxjx6CHj1GVUyZbdB8Ky48H95rnyPDtq4/tSpWA7HpguwC6gUd5:El5OexPjVFnSL1S4AzpguwC2

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD@N*]*nF

Targets

    • Target

      8f2049d7defe36c3970dc16ba924cc268cac0f9474ff5aca8d692d2b2b961726.exe

    • Size

      170KB

    • MD5

      d2f5552955ff07429b7218f4a4008cfc

    • SHA1

      56b59a77d25773d341aec87d268db3cde8649ea5

    • SHA256

      8f2049d7defe36c3970dc16ba924cc268cac0f9474ff5aca8d692d2b2b961726

    • SHA512

      94e14f03d068d8b3e9208aab419d86077524e0c1dc2fab924951aa1f26738fc1b470940056f1ca15acbf65028a1ccf43c0cadc7a538f2597c88eb32c173f4a6c

    • SSDEEP

      3072:EP95ONHGTxjx6CHj1GVUyZbdB8Ky48H95rnyPDtq4/tSpWA7HpguwC6gUd5:El5OexPjVFnSL1S4AzpguwC2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks