General

  • Target

    2ea15aa68317ad61bdcff453f0750281_JaffaCakes118

  • Size

    858KB

  • Sample

    240329-3qvv5sch77

  • MD5

    2ea15aa68317ad61bdcff453f0750281

  • SHA1

    10bfcd418e65f26a49f8c8c589352872d32d0492

  • SHA256

    20351bfb18a4c774795e240a1a143754493ce9c89edf007c5cb110e4bce447a9

  • SHA512

    5b92dfebaffc4c4fefd0ea0bbd85f6add5480f4039d5b940e26c2ade527719e73acf77302bf5853864d7ed0243af09b2f15b58312d1c0a6f62e6bae29c01b7e8

  • SSDEEP

    12288:pwEgszmNH4u9LS4NXZeCogcQv6QE2Fxov/G6Y:sfngCogcQyQE2Fxa/a

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      2ea15aa68317ad61bdcff453f0750281_JaffaCakes118

    • Size

      858KB

    • MD5

      2ea15aa68317ad61bdcff453f0750281

    • SHA1

      10bfcd418e65f26a49f8c8c589352872d32d0492

    • SHA256

      20351bfb18a4c774795e240a1a143754493ce9c89edf007c5cb110e4bce447a9

    • SHA512

      5b92dfebaffc4c4fefd0ea0bbd85f6add5480f4039d5b940e26c2ade527719e73acf77302bf5853864d7ed0243af09b2f15b58312d1c0a6f62e6bae29c01b7e8

    • SSDEEP

      12288:pwEgszmNH4u9LS4NXZeCogcQv6QE2Fxov/G6Y:sfngCogcQyQE2Fxa/a

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks