General

  • Target

    02fd8bf0a63bef700772a26b668f5f6e_JaffaCakes118

  • Size

    861KB

  • Sample

    240328-mavx7sga55

  • MD5

    02fd8bf0a63bef700772a26b668f5f6e

  • SHA1

    70cd8037604370346df9192e2e02c2a699137079

  • SHA256

    e420e3e9215aff5e36305d36bb261796a02468fdba91d148e484b450c7ba3e86

  • SHA512

    6597a18aa86901d36b1fb2097704377c24169326554139e7230f2c0e0acea534429b3d07409f25c1366f2716cd5dbfc4cee2417058453a3afb7b05d1a912eb4d

  • SSDEEP

    12288:2fVJVlDtFpC0mNuiptqb24pwS+hvqkq3vIQRukzjHhUyL6Rw13z71HQrXwTeg8AC:OJVl80m08+wSoqkq3v

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.liuxnett.com
  • Port:
    587
  • Username:
    restorelogs@liuxnett.com
  • Password:
    ?54aMnD_trv}

Targets

    • Target

      02fd8bf0a63bef700772a26b668f5f6e_JaffaCakes118

    • Size

      861KB

    • MD5

      02fd8bf0a63bef700772a26b668f5f6e

    • SHA1

      70cd8037604370346df9192e2e02c2a699137079

    • SHA256

      e420e3e9215aff5e36305d36bb261796a02468fdba91d148e484b450c7ba3e86

    • SHA512

      6597a18aa86901d36b1fb2097704377c24169326554139e7230f2c0e0acea534429b3d07409f25c1366f2716cd5dbfc4cee2417058453a3afb7b05d1a912eb4d

    • SSDEEP

      12288:2fVJVlDtFpC0mNuiptqb24pwS+hvqkq3vIQRukzjHhUyL6Rw13z71HQrXwTeg8AC:OJVl80m08+wSoqkq3v

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks