General

  • Target

    4a2b206da286a5fc10f722daa2ec9712_JaffaCakes118

  • Size

    518KB

  • Sample

    240331-cdzepabg3y

  • MD5

    4a2b206da286a5fc10f722daa2ec9712

  • SHA1

    17eda317cf7ab2733b8b7a35aafdb19d827ba842

  • SHA256

    d258a4db20dfd6da41fca5215b43e1f27266735b8be794485d412bb0ddb3c80c

  • SHA512

    63c4117d9dda94e578e59872b1fe42b8f73445930484e8622963491d1b4a633e9d74dcdbdcca088d5caa692a49b8e59e32982434355c3fef23c3a9944ae2ab4e

  • SSDEEP

    6144:L16MFohvg6e6UqrlRalE9dGK0JBDxuWaHOikU80G2S+0gHvW+OJz921AsOjz:GhvhU29dGBJhxuHF6yL0

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      4a2b206da286a5fc10f722daa2ec9712_JaffaCakes118

    • Size

      518KB

    • MD5

      4a2b206da286a5fc10f722daa2ec9712

    • SHA1

      17eda317cf7ab2733b8b7a35aafdb19d827ba842

    • SHA256

      d258a4db20dfd6da41fca5215b43e1f27266735b8be794485d412bb0ddb3c80c

    • SHA512

      63c4117d9dda94e578e59872b1fe42b8f73445930484e8622963491d1b4a633e9d74dcdbdcca088d5caa692a49b8e59e32982434355c3fef23c3a9944ae2ab4e

    • SSDEEP

      6144:L16MFohvg6e6UqrlRalE9dGK0JBDxuWaHOikU80G2S+0gHvW+OJz921AsOjz:GhvhU29dGBJhxuHF6yL0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks