General

  • Target

    eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd

  • Size

    1.4MB

  • Sample

    241125-d1k19asjcn

  • MD5

    e717ed3845849e9a3bfbb53c8ecb87f2

  • SHA1

    7ae3a696867e9fb90d2633672801ff8dcc6d0d6c

  • SHA256

    eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd

  • SHA512

    97aecfe61a881a1791a396ee92f6c3b18a7a21bcbfb80f5cda69f81678863119c2220eb102e7233512483f95c2588a0e5955762036ced72d658ab2b9a936b8da

  • SSDEEP

    12288:h1Ql5Z04nr+u96ovJI3pmnbjvLb1H9u60Bj3tqxpopll2L+aB:hWLP9Z4GnLBH9/Qtqczha

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sqlv#))OxYLxAXyhMyi

Targets

    • Target

      eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd

    • Size

      1.4MB

    • MD5

      e717ed3845849e9a3bfbb53c8ecb87f2

    • SHA1

      7ae3a696867e9fb90d2633672801ff8dcc6d0d6c

    • SHA256

      eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd

    • SHA512

      97aecfe61a881a1791a396ee92f6c3b18a7a21bcbfb80f5cda69f81678863119c2220eb102e7233512483f95c2588a0e5955762036ced72d658ab2b9a936b8da

    • SSDEEP

      12288:h1Ql5Z04nr+u96ovJI3pmnbjvLb1H9u60Bj3tqxpopll2L+aB:hWLP9Z4GnLBH9/Qtqczha

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks