General

  • Target

    Week4.exe

  • Size

    184KB

  • Sample

    250210-1xw1nszrgy

  • MD5

    624401070bba5e7be70e21e3da0a1b45

  • SHA1

    c4ea9df10fc2043b917d6276e39b7bb4639c251d

  • SHA256

    668e51b1f586bbd6b1d35890299933ea7cfa2cd62c47febb11ed2db5726bebfc

  • SHA512

    5b1b17b413378349731b31a5462e002dc8ae044fc0a2d94d6564af465002badd6e214d0d754b7fe583cdcf3a91b23ab680a6c0349550ef1baef7933240bfe2a7

  • SSDEEP

    3072:Q2lYlqsF8A8OgMz1b71qLwBgnVg5M4qRrVzPNnqaHIEAybY:+/NbpsnVgXQzPNJH3zb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.status-automation.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bkkhoostatus2018

Targets

    • Target

      Week4.exe

    • Size

      184KB

    • MD5

      624401070bba5e7be70e21e3da0a1b45

    • SHA1

      c4ea9df10fc2043b917d6276e39b7bb4639c251d

    • SHA256

      668e51b1f586bbd6b1d35890299933ea7cfa2cd62c47febb11ed2db5726bebfc

    • SHA512

      5b1b17b413378349731b31a5462e002dc8ae044fc0a2d94d6564af465002badd6e214d0d754b7fe583cdcf3a91b23ab680a6c0349550ef1baef7933240bfe2a7

    • SSDEEP

      3072:Q2lYlqsF8A8OgMz1b71qLwBgnVg5M4qRrVzPNnqaHIEAybY:+/NbpsnVgXQzPNJH3zb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks