General

  • Target

    137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116.exe

  • Size

    1.4MB

  • Sample

    241119-cnr4csyekg

  • MD5

    9c6de69b3f4bd16dc76a37fd8a50aea4

  • SHA1

    a5c6f87a637a6e5ffd073dc90a3cbfa0591160c1

  • SHA256

    137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116

  • SHA512

    255dbc20c850d91eaccbe338b99ef1e144af703e6bc88c70f8d8d0f6dd2089cbbc6ddb2f8b4dccd6770c75bc21176ae41566eb995d58645ae0a86d42ef1d3841

  • SSDEEP

    12288:Yx093lfiCZNsgg/iUZ0vXTWyzopB2QrJ30Bme47vAn+TbzeB:YIiFzj+vXhzop5rJ3gmYSe

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD@N*]*nF

Targets

    • Target

      137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116.exe

    • Size

      1.4MB

    • MD5

      9c6de69b3f4bd16dc76a37fd8a50aea4

    • SHA1

      a5c6f87a637a6e5ffd073dc90a3cbfa0591160c1

    • SHA256

      137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116

    • SHA512

      255dbc20c850d91eaccbe338b99ef1e144af703e6bc88c70f8d8d0f6dd2089cbbc6ddb2f8b4dccd6770c75bc21176ae41566eb995d58645ae0a86d42ef1d3841

    • SSDEEP

      12288:Yx093lfiCZNsgg/iUZ0vXTWyzopB2QrJ30Bme47vAn+TbzeB:YIiFzj+vXhzop5rJ3gmYSe

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks