General

  • Target

    ead9184dd4abb60f8f2092e194a9cfa8_JaffaCakes118

  • Size

    463KB

  • Sample

    240410-mek9kafc7w

  • MD5

    ead9184dd4abb60f8f2092e194a9cfa8

  • SHA1

    6c7668dc864f740e2f67af822da9ec0001770a7e

  • SHA256

    274be467551e7b14ef4b24d2a54113c272dba07bd6fec799739077971ed4ffe7

  • SHA512

    0800323569a4ba09620f879c0a83074d888ac0bf6c4f046f98a7d4d68742148b29a7f57da6843a8df6d7ff98a23338678b6db4531e90df68241a93a9cd798b31

  • SSDEEP

    12288:euUcBDrUHfYyxlOkVujFLrKiFgJ8TSXyki3TLB/SB:bjrUbVujFLB+GeJi3vIB

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.faks-allied-health.com
  • Port:
    587
  • Username:
    info@faks-allied-health.com
  • Password:
    $Faks1234
  • Email To:
    wealthmyson@yandex.com

Targets

    • Target

      ead9184dd4abb60f8f2092e194a9cfa8_JaffaCakes118

    • Size

      463KB

    • MD5

      ead9184dd4abb60f8f2092e194a9cfa8

    • SHA1

      6c7668dc864f740e2f67af822da9ec0001770a7e

    • SHA256

      274be467551e7b14ef4b24d2a54113c272dba07bd6fec799739077971ed4ffe7

    • SHA512

      0800323569a4ba09620f879c0a83074d888ac0bf6c4f046f98a7d4d68742148b29a7f57da6843a8df6d7ff98a23338678b6db4531e90df68241a93a9cd798b31

    • SSDEEP

      12288:euUcBDrUHfYyxlOkVujFLrKiFgJ8TSXyki3TLB/SB:bjrUbVujFLB+GeJi3vIB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks