General

  • Target

    PO#5831205.exe

  • Size

    618KB

  • Sample

    250130-xzb7haslcl

  • MD5

    931ed17fdcdb3ff5176c81d1bc35468b

  • SHA1

    8fe727064eca37e6823393e28580f70a2d01b182

  • SHA256

    256b0ce3c9164315809fbcfbbdb1624d662b72cd5156bfcab0550abd88f83dca

  • SHA512

    dab2149f9d127352ded6b0596ffd4b04d9cfe53b09772e61a5a1447891690520ac48d31a430038b3498244fab79efee35756c7922c208791039ae7712a74f560

  • SSDEEP

    12288:BKN3E8b4cgmzUODZda4IOhNm2SzuH2LH6j8q3QtoQP:MG44cgmzJdNI+mBC1L3HI

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aktagor-prom.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    71z&rRC84

Targets

    • Target

      PO#5831205.exe

    • Size

      618KB

    • MD5

      931ed17fdcdb3ff5176c81d1bc35468b

    • SHA1

      8fe727064eca37e6823393e28580f70a2d01b182

    • SHA256

      256b0ce3c9164315809fbcfbbdb1624d662b72cd5156bfcab0550abd88f83dca

    • SHA512

      dab2149f9d127352ded6b0596ffd4b04d9cfe53b09772e61a5a1447891690520ac48d31a430038b3498244fab79efee35756c7922c208791039ae7712a74f560

    • SSDEEP

      12288:BKN3E8b4cgmzUODZda4IOhNm2SzuH2LH6j8q3QtoQP:MG44cgmzJdNI+mBC1L3HI

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks