General

  • Target

    435f32113eacbe46d3cf0b9de7b7f9fb_JaffaCakes118

  • Size

    326KB

  • Sample

    240713-z5e7fszdnc

  • MD5

    435f32113eacbe46d3cf0b9de7b7f9fb

  • SHA1

    d115b5acb72c2dab26f6602d25c0228432966a89

  • SHA256

    48acccc6de63e6c3998ee2e8f141385c22db79ad40073bd15e49ac73f88bdba5

  • SHA512

    0c1bde1a099a31a01de23bda2cfd94295133d58cd3577318543ecf010051f1913d8d5d344894c02f84c0f0a638ccc60826472e9559917f1d706476615c27bbf0

  • SSDEEP

    6144:kRNThNT/r8YGoOtubn28O2N+3Q/1rdXzTdkiMD9U02nt+MVf:kbTTTj8YJOtuz28O2g3Q9rtaiMhUF+MJ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Order Quotation.pdf.exe

    • Size

      364KB

    • MD5

      3e538a2bcfd2b69fd9bf65ff03c15df4

    • SHA1

      9834ea82eaa4f9a6d93b1910f50b2af7864aa6f3

    • SHA256

      8c0cdce2996d1a5ab9c8c3c83c28ec88bb0d6a88793bbcfaa1599d67f6a247d6

    • SHA512

      be0d9ca4e8681838c77fd305e382b2d5576dcaf27b9442240e563dc9094ae20863b1ccf77f280b92696c0f1aa3bfa6e579402705c2d573e652f0677f501fe8cd

    • SSDEEP

      6144:PIO/lGqodH+8eYU4ElxkPD2xOV7kWXizSiMgIhUzDSxzS/NDe3a+wlZcIL+F:PwVH+8b2sVGSidz+xzSsa+yiIL+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks