General

  • Target

    cbc313ddccede4e1abc2eb066210eb3e_JaffaCakes118

  • Size

    641KB

  • Sample

    240405-fwn88adc95

  • MD5

    cbc313ddccede4e1abc2eb066210eb3e

  • SHA1

    b8e2b4ed6246f0909ae31c334c9aef959ab3f851

  • SHA256

    f42557743e88d50544f011d55f67023915bacac6db0e9bde538b7d8e76e047a8

  • SHA512

    13e1c22f41d87a26f7e8203d75eb2aa977ce137d758d22d5ed04f96d8ef678ee0946604301278fd0517bbe95b1e704dca1bb7d501e96710fc6f16a4de5bfa3b4

  • SSDEEP

    6144:ARFVmrLWI1gED/TA2EN5b5ylmIUUCn7xf+qW/3b7GXrdCMCjsLwNaScBF5HjQ8GB:ARiWSaHb5qjDqWH2pJCCwNaSctMX

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      cbc313ddccede4e1abc2eb066210eb3e_JaffaCakes118

    • Size

      641KB

    • MD5

      cbc313ddccede4e1abc2eb066210eb3e

    • SHA1

      b8e2b4ed6246f0909ae31c334c9aef959ab3f851

    • SHA256

      f42557743e88d50544f011d55f67023915bacac6db0e9bde538b7d8e76e047a8

    • SHA512

      13e1c22f41d87a26f7e8203d75eb2aa977ce137d758d22d5ed04f96d8ef678ee0946604301278fd0517bbe95b1e704dca1bb7d501e96710fc6f16a4de5bfa3b4

    • SSDEEP

      6144:ARFVmrLWI1gED/TA2EN5b5ylmIUUCn7xf+qW/3b7GXrdCMCjsLwNaScBF5HjQ8GB:ARiWSaHb5qjDqWH2pJCCwNaSctMX

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks