General

  • Target

    f4406df1b0ca5dc97b1f0d2f57102e27_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240416-y471eadc4y

  • MD5

    f4406df1b0ca5dc97b1f0d2f57102e27

  • SHA1

    397851638f1cc999615aeca911a1a02a180b5d99

  • SHA256

    460ece62f40e00fbde378d890513acb09f03fb2f4a8da93b6305a0df0c5544dd

  • SHA512

    8d04d63fdc2849013f624b2a692e10e5076d8e8b6c5635d939bd096ab8d54361625cb086990a7192cc0adb0629f839467f9212dab8b86f33eeede2130657e978

  • SSDEEP

    24576:yzoIWmb+Mg2gRVyt5OgPf4Am4H+SHLw78aUOGemKDL0dlRG95WN90bc:yzovmbgRVCJP/HLUnUO8KDL0dno58ib

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.crmsynergies.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qWU#FcYx(9

Targets

    • Target

      f4406df1b0ca5dc97b1f0d2f57102e27_JaffaCakes118

    • Size

      1.5MB

    • MD5

      f4406df1b0ca5dc97b1f0d2f57102e27

    • SHA1

      397851638f1cc999615aeca911a1a02a180b5d99

    • SHA256

      460ece62f40e00fbde378d890513acb09f03fb2f4a8da93b6305a0df0c5544dd

    • SHA512

      8d04d63fdc2849013f624b2a692e10e5076d8e8b6c5635d939bd096ab8d54361625cb086990a7192cc0adb0629f839467f9212dab8b86f33eeede2130657e978

    • SSDEEP

      24576:yzoIWmb+Mg2gRVyt5OgPf4Am4H+SHLw78aUOGemKDL0dlRG95WN90bc:yzovmbgRVCJP/HLUnUO8KDL0dno58ib

    • Detect ZGRat V1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks