General

  • Target

    4e415619e7c0afc2f2e58deb353a682795353f0bea3d0b0498d8ddc5c1da6af9.exe

  • Size

    521KB

  • Sample

    240627-bneycsvcpg

  • MD5

    798917173088921d8ba248e941690e11

  • SHA1

    88fd67eaf675f2db3e2ad9143bce6d8d3713835c

  • SHA256

    4e415619e7c0afc2f2e58deb353a682795353f0bea3d0b0498d8ddc5c1da6af9

  • SHA512

    48947b6e3ab56a83220137b3ec4a5cefaa03474affdc521642bf4a4e1a81da0d43730af54c7c01e2aeb86555ffbb5a95cfe2c1ea58b99e6dc940420e49793116

  • SSDEEP

    6144:cTVFZInd6Xcfg9UYkn08VxTKv6Io8/i2qvv+bGnJ3GUzF+TgtGim/hImg6pod:c5kndm/knzLKvFo8nqv2iJHtUimOtLd

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    i~~Ga+6_-~V*

Targets

    • Target

      4e415619e7c0afc2f2e58deb353a682795353f0bea3d0b0498d8ddc5c1da6af9.exe

    • Size

      521KB

    • MD5

      798917173088921d8ba248e941690e11

    • SHA1

      88fd67eaf675f2db3e2ad9143bce6d8d3713835c

    • SHA256

      4e415619e7c0afc2f2e58deb353a682795353f0bea3d0b0498d8ddc5c1da6af9

    • SHA512

      48947b6e3ab56a83220137b3ec4a5cefaa03474affdc521642bf4a4e1a81da0d43730af54c7c01e2aeb86555ffbb5a95cfe2c1ea58b99e6dc940420e49793116

    • SSDEEP

      6144:cTVFZInd6Xcfg9UYkn08VxTKv6Io8/i2qvv+bGnJ3GUzF+TgtGim/hImg6pod:c5kndm/knzLKvFo8nqv2iJHtUimOtLd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks