General

  • Target

    Purchase order (2).exe

  • Size

    627KB

  • Sample

    250204-l5c57svmbj

  • MD5

    e46322a13f7e130f2294868039d590db

  • SHA1

    ae76daed525d3a9305b5a590b4b2a537271e82db

  • SHA256

    edb1cca28f17cb58bf00da7a1d6cafe547afd28335551d38fca8806e313b1fd2

  • SHA512

    893ca7fa598a3303a6c4686a51189001f5e77a790c755bc17e11dc7563ba2ecbc713b424d7dbceb05734cc3567543a00d9eb8f9a1e0873f613e52f6bef7acbd5

  • SSDEEP

    12288:S1c4D2Z6Ybj6rEGog8UMevY4JC0B1PVh2Q/S7gTvrpK6NstKy+0H18er3:h+k6YbjeB8UJ/Uy1Pj2Q/S0TvrA6IT+

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Leternel01@

Targets

    • Target

      Purchase order (2).exe

    • Size

      627KB

    • MD5

      e46322a13f7e130f2294868039d590db

    • SHA1

      ae76daed525d3a9305b5a590b4b2a537271e82db

    • SHA256

      edb1cca28f17cb58bf00da7a1d6cafe547afd28335551d38fca8806e313b1fd2

    • SHA512

      893ca7fa598a3303a6c4686a51189001f5e77a790c755bc17e11dc7563ba2ecbc713b424d7dbceb05734cc3567543a00d9eb8f9a1e0873f613e52f6bef7acbd5

    • SSDEEP

      12288:S1c4D2Z6Ybj6rEGog8UMevY4JC0B1PVh2Q/S7gTvrpK6NstKy+0H18er3:h+k6YbjeB8UJ/Uy1Pj2Q/S0TvrA6IT+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks