General

  • Target

    QUOTATION_NOVQTRA071244úPDF.scr

  • Size

    420KB

  • Sample

    241108-ndynyatndl

  • MD5

    7d50e08c368eaf91f6cd1c8969761108

  • SHA1

    50856851fa5d4f281e93c198897f703eb750b355

  • SHA256

    7ee5e24fa0d20eefa1a946a96a39548ff24ef9ae19745d740b542a5ca21d85fd

  • SHA512

    08efa2e487e742768028b548b6b79193cb60b965ad4bc93a6a1a1efe4a0f0cf92154302602eae029b84a8b0517bd7c2b229cdd94e0e5cfb13eccb1d2298adf46

  • SSDEEP

    3072:ZReD62h/yxtsdklfxG2aN6mvVgBRJhZCkaB4lXlrtB6tyYuyE:ZsD62h/yxmdke2E6mNgbJhZHVtB6E

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD@N*]*nF

Targets

    • Target

      QUOTATION_NOVQTRA071244úPDF.scr

    • Size

      420KB

    • MD5

      7d50e08c368eaf91f6cd1c8969761108

    • SHA1

      50856851fa5d4f281e93c198897f703eb750b355

    • SHA256

      7ee5e24fa0d20eefa1a946a96a39548ff24ef9ae19745d740b542a5ca21d85fd

    • SHA512

      08efa2e487e742768028b548b6b79193cb60b965ad4bc93a6a1a1efe4a0f0cf92154302602eae029b84a8b0517bd7c2b229cdd94e0e5cfb13eccb1d2298adf46

    • SSDEEP

      3072:ZReD62h/yxtsdklfxG2aN6mvVgBRJhZCkaB4lXlrtB6tyYuyE:ZsD62h/yxmdke2E6mNgbJhZHVtB6E

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks