General

  • Target

    7066fcfced087dd4216fedc8a76957eed3d1ddfca059d735e931868d29f29511

  • Size

    535KB

  • Sample

    250130-vadmxsypdm

  • MD5

    f78f3d7bebf09e34f58c07c9670be39c

  • SHA1

    4a53985ec8c627420dcd3d1689ac19d092942634

  • SHA256

    7066fcfced087dd4216fedc8a76957eed3d1ddfca059d735e931868d29f29511

  • SHA512

    0fd41f9ab416463a6a9aee9e8b2fd10b9ff7a5ea82ddcbd9f54d6a21f27b1a14500eabe26ee8aaa8b7d4e243451ed43254ab679697612b4c6871e9a7d9a29567

  • SSDEEP

    12288:P6iXwHyBWuBAqGoIec4RZcJVFpMcS9SN/3tlmtWI1mm:PNwSBWuBAiZcRpMpu3Oum

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Leternel01@

Targets

    • Target

      Purchase Order (2).exe

    • Size

      618KB

    • MD5

      d3b15e236df60a0e551bf21a26718250

    • SHA1

      66626b523351b325c5d58569ec29d6a197698345

    • SHA256

      dbc06aa2f5d8c73c079f19b7799691da6109b3a2afa2ea066c90afbab963acc2

    • SHA512

      c4727719c3ec92599e6b0db89c197d102bccc1600c67089ec01bdf3cf1b075b79154febb29b69ac5303495f0859353a527a8583aee5e4ede8e217529e2b4c6b1

    • SSDEEP

      6144:5o5JyDt117h5r2V96LUAqGMkMaAxfdXLJHOoOyX9nK6OyJvW/SNRaOlmDD9LGwYd:5RGGUAqGmJd9n1OyJOKtlm9pYr+0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks