General

  • Target

    fa5de30a4d0594185fb990379369bebe_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240419-qffl9adc37

  • MD5

    fa5de30a4d0594185fb990379369bebe

  • SHA1

    42d6355686cb294048c7d0dabcc224a605410120

  • SHA256

    67d8307af4d41c9ec4c2d5455f31aa91e2a446a6ecd7113494dbcdb8769e4b05

  • SHA512

    9614c5f259715e9265041d4214f913b37e728331d2ea3b6877a4b0ac3204348267b8de394285090fe5ddd255f3c3141839aa9837ba23d52ad12f8992f161bb83

  • SSDEEP

    24576:6KBEN76DOufx8Dgyfx8DgKXjH1Wvo3TjegQH/EwDZjSL:CN76758Dgy58DgKz2xH/TZW

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.garqwire.com
  • Port:
    587
  • Username:
    ucwokes@garqwire.com
  • Password:
    @jueZaU?4j9?
  • Email To:
    mouricejan1966@gmail.com

Targets

    • Target

      fa5de30a4d0594185fb990379369bebe_JaffaCakes118

    • Size

      1.2MB

    • MD5

      fa5de30a4d0594185fb990379369bebe

    • SHA1

      42d6355686cb294048c7d0dabcc224a605410120

    • SHA256

      67d8307af4d41c9ec4c2d5455f31aa91e2a446a6ecd7113494dbcdb8769e4b05

    • SHA512

      9614c5f259715e9265041d4214f913b37e728331d2ea3b6877a4b0ac3204348267b8de394285090fe5ddd255f3c3141839aa9837ba23d52ad12f8992f161bb83

    • SSDEEP

      24576:6KBEN76DOufx8Dgyfx8DgKXjH1Wvo3TjegQH/EwDZjSL:CN76758Dgy58DgKz2xH/TZW

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks