General

  • Target

    QUOTATION_NOVQTRA071244úPDF.scr.exe

  • Size

    1.5MB

  • Sample

    241127-vdyr9ssjc1

  • MD5

    bd52792b9f402d991f0fff1712735a57

  • SHA1

    07edcefb118e06ce7df2de159b148620df2120e5

  • SHA256

    d2617d63332d35b6c7e44499bd90d0ad52de53cb5135d9c96cc763d4b1391e33

  • SHA512

    c534a1bc6ff9d4cf2b08e304a98b23097a0ad3027a877eed4753f4f1d38771e7b2f2002447139c30bf89c4ba435364103bde2236dfe5b752324c4cd43a057121

  • SSDEEP

    24576:AdFYBpfub/4k4cSWEvHMCqytJZdgZuvgJw5qxaD+sX2:AdFopS54bWEviSPaovifch2

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    send4egbe@qlststv.com
  • Password:
    JOYEss..&UK55@@!!
  • Email To:
    jsender@qlststv.com

Targets

    • Target

      QUOTATION_NOVQTRA071244úPDF.scr.exe

    • Size

      1.5MB

    • MD5

      bd52792b9f402d991f0fff1712735a57

    • SHA1

      07edcefb118e06ce7df2de159b148620df2120e5

    • SHA256

      d2617d63332d35b6c7e44499bd90d0ad52de53cb5135d9c96cc763d4b1391e33

    • SHA512

      c534a1bc6ff9d4cf2b08e304a98b23097a0ad3027a877eed4753f4f1d38771e7b2f2002447139c30bf89c4ba435364103bde2236dfe5b752324c4cd43a057121

    • SSDEEP

      24576:AdFYBpfub/4k4cSWEvHMCqytJZdgZuvgJw5qxaD+sX2:AdFopS54bWEviSPaovifch2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.