General

  • Target

    26924709bded5d395fd3a6f44c2cd0cbaca595724da8e8965026e4459045c848

  • Size

    606KB

  • Sample

    250213-ljrfpswldp

  • MD5

    d0e97c7751a40f7b34113b30d77ffdb6

  • SHA1

    50bb07567a8065c132a845577ecbc60d97ea622d

  • SHA256

    26924709bded5d395fd3a6f44c2cd0cbaca595724da8e8965026e4459045c848

  • SHA512

    b9d1f5150db6dd33fea7d33ed44ae3bca937cafb10ca9a5fbb7dc9d3a70ebf74148a770070cf225d59fa2f8e26cac4ef5b23de8b8d4d9a2f0b5a09d6a7800ba4

  • SSDEEP

    12288:CcgJchyQzgPV3zCvAnoPijvjw2MEMIhv/GwDNG5lMwSh:Cc0c0avFPmr/MmvTWRq

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aktagor-prom.by
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    RC84pv9H2*F

Targets

    • Target

      VkF80MC8Kd7Z5Bd.exe

    • Size

      686KB

    • MD5

      15a83d767191060be2ade250eb183cd0

    • SHA1

      c61c7f82af922b45ac694edecaa824aed22bae00

    • SHA256

      b0f20f8a79db9d246f9812607ca3fc0019fc6c7905ffaa333bc0587fb69a1e58

    • SHA512

      16082aec6537f6a0930b83f3b08e88bcbd6b3a418656711d2a89edee6b1885141f044f173e776ce6de24c03bc9fc5294227fb293e0818c5b7f49d4dab8e9d7c3

    • SSDEEP

      12288:5bAHH/DneK/bQPgPv3tQ78PoHiVtMYCGV/uwDP3e3iLmMx:5bKHzeKi7vHmtMapUiLXx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks