General

  • Target

    c2670beab3a197ef9f14a748f6b6ca0ef65f85085cc1952d3ae079c49d8e2f44

  • Size

    170KB

  • Sample

    241107-ssnjqstqcs

  • MD5

    67d6a0a61874283a9bc7e1b8189432df

  • SHA1

    c3d9c129da212ec1bc79b0059c6e6267b209a2d8

  • SHA256

    c2670beab3a197ef9f14a748f6b6ca0ef65f85085cc1952d3ae079c49d8e2f44

  • SHA512

    de299721d71a28564f724c44e019b013cd24974022f39ed7457132599bc24506a8329615921d85cdfaca3d859ef0abb223b9a78f1969eb23e14db23cafea4a0c

  • SSDEEP

    3072:xZZnWRLarVjB6ibPde98yljJuKOIEJ9uGYVYCzKoJV2IePUs6gGK1:xfnWaBbPN5YxWk

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    D#Hm!GgJ,?fO;gfR

Targets

    • Target

      c2670beab3a197ef9f14a748f6b6ca0ef65f85085cc1952d3ae079c49d8e2f44

    • Size

      170KB

    • MD5

      67d6a0a61874283a9bc7e1b8189432df

    • SHA1

      c3d9c129da212ec1bc79b0059c6e6267b209a2d8

    • SHA256

      c2670beab3a197ef9f14a748f6b6ca0ef65f85085cc1952d3ae079c49d8e2f44

    • SHA512

      de299721d71a28564f724c44e019b013cd24974022f39ed7457132599bc24506a8329615921d85cdfaca3d859ef0abb223b9a78f1969eb23e14db23cafea4a0c

    • SSDEEP

      3072:xZZnWRLarVjB6ibPde98yljJuKOIEJ9uGYVYCzKoJV2IePUs6gGK1:xfnWaBbPN5YxWk

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks