General

  • Target

    a11f0afb4803b65a79f0102767d4b3d1_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240817-ej7pcswdng

  • MD5

    a11f0afb4803b65a79f0102767d4b3d1

  • SHA1

    8fd374959dcff21b8fb1a7e830a35bd0ddb5e229

  • SHA256

    ce6e6ebddcbd695f81f01a71c942354ccb5f005e686968c1945d9c7bd6d2dd64

  • SHA512

    4fedf1028b76f28711d4f58f0cd6162faea8346a64fb937d4ea712c978a712914445e60c254c5f33ca84dd9090221ef6ba10cd9eb571b6d7fbea31b8ed67cc59

  • SSDEEP

    12288:sl4XsYCvxGbhXycaJ1JY5U2OgwXtr2R72pn+ixmeE2wT:x9CpGdy9J1m5Vo2R7Cn+i8/1

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://bitrix370.timeweb.ru/
  • Port:
    21
  • Username:
    cn94754
  • Password:
    c2eitfpidhgS

Targets

    • Target

      Shipping Documents Original BL, Invoice & Packing List.exe

    • Size

      827KB

    • MD5

      f281e6f97227cfdcb2edca1037fb0efb

    • SHA1

      745c3bd6b590aee05eb9af4bb6241df002796873

    • SHA256

      67108fc6d911e90188c65b91728152289ba95b48ab037fecf68822c818c4c812

    • SHA512

      e0e21957ffaf42e1f7d6192a77c1c60313b293860bfd8f82f54568d5249782e891ac8b2e3f4133f2e26d3c6433594b13086c68127f16d769fbc61245d209c2d8

    • SSDEEP

      12288:Sl4XsYCvxGbhXycaJ1JY5U2OgwXtr2R72pn+ixmeE2wT:79CpGdy9J1m5Vo2R7Cn+i8/1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks