General

  • Target

    7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626.exe

  • Size

    1.2MB

  • Sample

    241112-m6wvdatrdr

  • MD5

    5e12b8af30ba25592deea2af600acf84

  • SHA1

    dbd4874dc2ceaa88ca57f7e9b11bdb6d4616ce0a

  • SHA256

    7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626

  • SHA512

    07562cacaff7c1c8572c17621d7afa77b296615e3b3194ecc9a4932fc73069e4cf9dc632abad032e0a420b3026d609d6c50617f1b5020d78e20777674e984f80

  • SSDEEP

    6144:qQEnLie8O3JkyEPtCS/0imMPIAcaei7z4XYm/phOfJI5+GRSTneGRpr0wQGCztNd:qNie8EOyEP3/dAADrziYmxR5bdwDkNd

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bellstone.in
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    N % m 22 , . , .2 0 2 10 3

Targets

    • Target

      7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626.exe

    • Size

      1.2MB

    • MD5

      5e12b8af30ba25592deea2af600acf84

    • SHA1

      dbd4874dc2ceaa88ca57f7e9b11bdb6d4616ce0a

    • SHA256

      7b7a836e506165c075d3bfb8ee2cdfc3971bc53729b51dd6b3b06fde1757e626

    • SHA512

      07562cacaff7c1c8572c17621d7afa77b296615e3b3194ecc9a4932fc73069e4cf9dc632abad032e0a420b3026d609d6c50617f1b5020d78e20777674e984f80

    • SSDEEP

      6144:qQEnLie8O3JkyEPtCS/0imMPIAcaei7z4XYm/phOfJI5+GRSTneGRpr0wQGCztNd:qNie8EOyEP3/dAADrziYmxR5bdwDkNd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks