General

  • Target

    f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240416-et8dmsbb6x

  • MD5

    f2ab46c4d6035194f6bb1a3fde6ba2ae

  • SHA1

    2db4d8e0ca62631d75302c0cd5c509c2158be5b1

  • SHA256

    1b808f880f3ce7f3f2206b471efc9ae4655bf7cc69da90f1191cb5e1926517eb

  • SHA512

    32454c0f23c02977a8016fc9cd372dc2943d86ea7f54f88d5f5d78df97aeb3a8443fad407f48820e918c02fea722bcb1dc386a4b3aa5d53c0474ea7a022846d6

  • SSDEEP

    24576:8aS/d3xKzksLksqeSj3hEuXpastDNaRLbkkKzFZ/y8jh8N6ZN8Z:qKVSj5ZtDNaRLoH/+N6ZN8

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ccmainoffice.com
  • Port:
    587
  • Username:
    cc@ccmainoffice.com
  • Password:
    QAZqaz123@
  • Email To:
    cc@ccmainoffice.com

Targets

    • Target

      f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118

    • Size

      1.2MB

    • MD5

      f2ab46c4d6035194f6bb1a3fde6ba2ae

    • SHA1

      2db4d8e0ca62631d75302c0cd5c509c2158be5b1

    • SHA256

      1b808f880f3ce7f3f2206b471efc9ae4655bf7cc69da90f1191cb5e1926517eb

    • SHA512

      32454c0f23c02977a8016fc9cd372dc2943d86ea7f54f88d5f5d78df97aeb3a8443fad407f48820e918c02fea722bcb1dc386a4b3aa5d53c0474ea7a022846d6

    • SSDEEP

      24576:8aS/d3xKzksLksqeSj3hEuXpastDNaRLbkkKzFZ/y8jh8N6ZN8Z:qKVSj5ZtDNaRLoH/+N6ZN8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks