General

  • Target

    32b4f238-3516-b261-c3ae-0c570d22ee18.eml

  • Size

    688KB

  • Sample

    241214-sp1pwswlgy

  • MD5

    60d00c17d3ea15910893eef868de7a65

  • SHA1

    1d17dd1688a903cbe423d8de58f8a7ab7ece1ea5

  • SHA256

    d13a7eaaf07c924159ea7bb8f297dab1d8da0f9af46e82e24052d6a9bf5e4087

  • SHA512

    c589a12dbbd2598eeb74564ae11142a2d1a17beb6fafcdb8211ff72d33dbe58ae7d17d03e5521819cd788a0c3158fe60738e15ef4a6285c1221d32f979c13813

  • SSDEEP

    12288:vZ1Tzm0D2acQLqgVIjejueFyhaCV2JKKS7hoxSSqkljhEi9lV7j:z7K8FuuzCV2JKkxPOQ3

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    UWzDeXWsD8

Targets

    • Target

      pago 4094.exe

    • Size

      528KB

    • MD5

      1a0f4cc0513f1b56fef01c815410c6ea

    • SHA1

      a663c9ecf8f488d6e07b892165ae0a3712b0e91f

    • SHA256

      d483d48c15f797c92c89d2eafcc9fc7cbe0c02cabe1d9130bb9069e8c897c94c

    • SHA512

      4251fd4738f6b47a327b1f1d7609aa5af623669734a1fc9ebf5786337d0fbc5142c8176e51f9f2f5869e47bdbbb2f46090f66fb3cea30189d57917b58049f84b

    • SSDEEP

      12288:PXPZDbCo/k+n70P4uR87fD0iBTJj1ijFDTw:hOz+IPz6/PF1ihDTw

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks