General

  • Target

    21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb.exe

  • Size

    1.3MB

  • Sample

    250122-cp839sspf1

  • MD5

    9dac35c40e2d920ca69f23ba735da601

  • SHA1

    122f12f3cb93b5476bbe3140e3eb6bbe2dfdd5db

  • SHA256

    21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb

  • SHA512

    559a65eefaff3399fd424cef1542d5720bed6a054edf5d2a7da66e397dae60aed5c8bc2e592313a01095fd303ec11b3dc05f10a5ac025bb137e7767341aa110d

  • SSDEEP

    24576:cSexfdreGMUzwpFOeSX2Pe3iDcZ/rG9dT5v/Phd:ZRGhuFOeSX2C9G9v/Ph

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.omzpnomatik.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Mustafa2023x

Targets

    • Target

      21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb.exe

    • Size

      1.3MB

    • MD5

      9dac35c40e2d920ca69f23ba735da601

    • SHA1

      122f12f3cb93b5476bbe3140e3eb6bbe2dfdd5db

    • SHA256

      21214c5b0f0e85bf2b07948dad8992c07025e0c7d32117d34ad899bd1e8d3cbb

    • SHA512

      559a65eefaff3399fd424cef1542d5720bed6a054edf5d2a7da66e397dae60aed5c8bc2e592313a01095fd303ec11b3dc05f10a5ac025bb137e7767341aa110d

    • SSDEEP

      24576:cSexfdreGMUzwpFOeSX2Pe3iDcZ/rG9dT5v/Phd:ZRGhuFOeSX2C9G9v/Ph

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks