General

  • Target

    852c78744e828250542bb9ddf2d7f2797c5613d2ab69cbd0faff944469d2c03b.exe

  • Size

    331KB

  • Sample

    241121-hdxtrazjht

  • MD5

    5287698c5838c217c8330670920d1f22

  • SHA1

    61d94cd397d56e87a13207f680f88fdf829eef71

  • SHA256

    852c78744e828250542bb9ddf2d7f2797c5613d2ab69cbd0faff944469d2c03b

  • SHA512

    4a2a295344a3842c9913e7fc0050b53cbb2733fd91019136212f9094351daf4bdac9ad3bdd989b19fbb186bd21404153ac96847269b1b988b70aa9a60f7d9d19

  • SSDEEP

    768:gl7ult3Qg2ZzEjss2VSg1I1cn0sspAgpq8hLyg1uMN0+dzsRs+eEH:+uLQ7qPpqOLy0uyL+fH

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD@N*]*nF

Targets

    • Target

      852c78744e828250542bb9ddf2d7f2797c5613d2ab69cbd0faff944469d2c03b.exe

    • Size

      331KB

    • MD5

      5287698c5838c217c8330670920d1f22

    • SHA1

      61d94cd397d56e87a13207f680f88fdf829eef71

    • SHA256

      852c78744e828250542bb9ddf2d7f2797c5613d2ab69cbd0faff944469d2c03b

    • SHA512

      4a2a295344a3842c9913e7fc0050b53cbb2733fd91019136212f9094351daf4bdac9ad3bdd989b19fbb186bd21404153ac96847269b1b988b70aa9a60f7d9d19

    • SSDEEP

      768:gl7ult3Qg2ZzEjss2VSg1I1cn0sspAgpq8hLyg1uMN0+dzsRs+eEH:+uLQ7qPpqOLy0uyL+fH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks