General

  • Target

    Shipping Document.exe

  • Size

    712KB

  • Sample

    250211-hm5wqazkcw

  • MD5

    852434f1bb9cf92bfe6e0bc4fae992ef

  • SHA1

    d9b12d152f6bc72c0b67f95a55bfdf7bb8ae2c0c

  • SHA256

    2cc0a2ec8e308a7433616621cff5cd49893b9e2277c76913eb7dd6e940ddac7b

  • SHA512

    4552815609a2bc2bf0ff31a2a04c1b1be3bdf47dd69b44f8595c3d77f028835c4365e8704c33dea211e54a627583dd81e94800c41f6ef0deff7601651cc6ad27

  • SSDEEP

    12288:ToaovT2lPK7J1/55ZgcaYvkwLHOSKjgbvQHXdr1CZawg3E7gGZgraxTwqANGo:y2BKzpLHOSKcb4HNqawgU7g

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Leternel01@

Targets

    • Target

      Shipping Document.exe

    • Size

      712KB

    • MD5

      852434f1bb9cf92bfe6e0bc4fae992ef

    • SHA1

      d9b12d152f6bc72c0b67f95a55bfdf7bb8ae2c0c

    • SHA256

      2cc0a2ec8e308a7433616621cff5cd49893b9e2277c76913eb7dd6e940ddac7b

    • SHA512

      4552815609a2bc2bf0ff31a2a04c1b1be3bdf47dd69b44f8595c3d77f028835c4365e8704c33dea211e54a627583dd81e94800c41f6ef0deff7601651cc6ad27

    • SSDEEP

      12288:ToaovT2lPK7J1/55ZgcaYvkwLHOSKjgbvQHXdr1CZawg3E7gGZgraxTwqANGo:y2BKzpLHOSKcb4HNqawgU7g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks