General

  • Target

    9978efecb67135510bfaa68f815dfb626011c70e1f96fd737114053c38540415

  • Size

    574KB

  • Sample

    250211-fesv3sxlck

  • MD5

    ac42566308507c79ee556e0586ba6cac

  • SHA1

    2fbf4c432d796836690a4100e7580daa5fbe89ff

  • SHA256

    9978efecb67135510bfaa68f815dfb626011c70e1f96fd737114053c38540415

  • SHA512

    a495b317e1406df49ac4bc5b785086b83e11dd4440a4e2c94ab2926e83b90770882962562cfd1f0fe71868d3092fe052555eba0308511b43a98f64888436963f

  • SSDEEP

    12288:/cyQx2qhzPxcZgaSK5gbHAHX1r1CZX8VRmyABI9TYKnnE7Bq/lB:/cyLqFcyaSKCbgHFqX8VkpIaKnE7eL

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Leternel01@

Targets

    • Target

      Purchase Order.exe

    • Size

      712KB

    • MD5

      852434f1bb9cf92bfe6e0bc4fae992ef

    • SHA1

      d9b12d152f6bc72c0b67f95a55bfdf7bb8ae2c0c

    • SHA256

      2cc0a2ec8e308a7433616621cff5cd49893b9e2277c76913eb7dd6e940ddac7b

    • SHA512

      4552815609a2bc2bf0ff31a2a04c1b1be3bdf47dd69b44f8595c3d77f028835c4365e8704c33dea211e54a627583dd81e94800c41f6ef0deff7601651cc6ad27

    • SSDEEP

      12288:ToaovT2lPK7J1/55ZgcaYvkwLHOSKjgbvQHXdr1CZawg3E7gGZgraxTwqANGo:y2BKzpLHOSKcb4HNqawgU7g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks