General

  • Target

    ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe

  • Size

    959KB

  • Sample

    240704-clxwts1cnc

  • MD5

    d662387f9f11b665b70d14c19177b058

  • SHA1

    3aa3745a01043cecec79b49a29cdfff60265d519

  • SHA256

    ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626

  • SHA512

    3bea71cee5f1a9bb94b9b01d3394b18a4a6a1b3e3e267f3fb11d3a9fe418364294fd906043031a64f6017a6e8f8dd5dfc85a11588209dda668fc8517d47c3508

  • SSDEEP

    12288:o+WbFkpXD7n1FDoPNUCobwMtFTUhqxDd1XK8:o+4i3nnDAUCobwQ3h1V

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    i~~Ga+6_-~V*

Targets

    • Target

      ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626.exe

    • Size

      959KB

    • MD5

      d662387f9f11b665b70d14c19177b058

    • SHA1

      3aa3745a01043cecec79b49a29cdfff60265d519

    • SHA256

      ec7e4a2cfd34ceccca73309ac6862f233904b1ab888b7a903ee18ecaf0c65626

    • SHA512

      3bea71cee5f1a9bb94b9b01d3394b18a4a6a1b3e3e267f3fb11d3a9fe418364294fd906043031a64f6017a6e8f8dd5dfc85a11588209dda668fc8517d47c3508

    • SSDEEP

      12288:o+WbFkpXD7n1FDoPNUCobwMtFTUhqxDd1XK8:o+4i3nnDAUCobwQ3h1V

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks