General

  • Target

    12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef.exe

  • Size

    746KB

  • Sample

    250130-dey1zsvqhq

  • MD5

    144602f926387c40adf4be23409ad855

  • SHA1

    b0611b6ecc6659373a16616af5907244c7e0adfa

  • SHA256

    12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef

  • SHA512

    b1f22c93da44740d87ff29d0a2b155f91ce87af3059baddfc663e4a42eaf03ae491802de2da6bc3a893a854cc122891db7e0fb8706165ff83d2a56608e24bb82

  • SSDEEP

    12288:NzSggsi/kjOXL+jD6nqppjPKb8setZxmfIj7bbZE0yz:NzkRLCD22jir0ZsyUz

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.saleo-gomel.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Q_gidroadmin_2014

Targets

    • Target

      12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef.exe

    • Size

      746KB

    • MD5

      144602f926387c40adf4be23409ad855

    • SHA1

      b0611b6ecc6659373a16616af5907244c7e0adfa

    • SHA256

      12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef

    • SHA512

      b1f22c93da44740d87ff29d0a2b155f91ce87af3059baddfc663e4a42eaf03ae491802de2da6bc3a893a854cc122891db7e0fb8706165ff83d2a56608e24bb82

    • SSDEEP

      12288:NzSggsi/kjOXL+jD6nqppjPKb8setZxmfIj7bbZE0yz:NzkRLCD22jir0ZsyUz

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks