General

  • Target

    74c5818c3bd47327115ed35e54e29b39b513b96335da5907edab19871bc543a4.zip

  • Size

    558KB

  • Sample

    250130-dsa63sxkdx

  • MD5

    52e415891c8f97e078fcaacad5ec8bf2

  • SHA1

    fda798518d5e69422a179920613ca572ece8c4c7

  • SHA256

    74c5818c3bd47327115ed35e54e29b39b513b96335da5907edab19871bc543a4

  • SHA512

    416dfb906fc6f7a0948c9c77c2ffe538662bbe68ed8601283198b789f2c5882202f96749826f347c5f4c1abc77511a9351dd0ea4e540b44b4a89a936f7afccb7

  • SSDEEP

    12288:VkmDotxpuHBww+jiMklr0jOeG3tRj7b/ZE0nfaSNATFkUIl3+AB:m6otLiCizr08rnST4tB

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.saleo-gomel.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Q_gidroadmin_2014

Targets

    • Target

      Order Specification.exe

    • Size

      746KB

    • MD5

      144602f926387c40adf4be23409ad855

    • SHA1

      b0611b6ecc6659373a16616af5907244c7e0adfa

    • SHA256

      12c242cb8567a6767775285e0bb313ec8dbbdce5155ec93a0cddee50dfbf92ef

    • SHA512

      b1f22c93da44740d87ff29d0a2b155f91ce87af3059baddfc663e4a42eaf03ae491802de2da6bc3a893a854cc122891db7e0fb8706165ff83d2a56608e24bb82

    • SSDEEP

      12288:NzSggsi/kjOXL+jD6nqppjPKb8setZxmfIj7bbZE0yz:NzkRLCD22jir0ZsyUz

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks