General

  • Target

    d0ed490284433d796f977488b9843601_JaffaCakes118

  • Size

    525KB

  • Sample

    240907-ddyc3a1fjm

  • MD5

    d0ed490284433d796f977488b9843601

  • SHA1

    1bb180e020c0e7cac9b94e22a8a1703e232f954d

  • SHA256

    3bdaa9e0d66e51b9c52aa8747980eed96f353b57b165d2ff5f3c7b8d529220ad

  • SHA512

    d8e590bfb7d421cbc81c69a1cd59b4c73c4935a1b2abc56f3bbb4f18c7bfd092db9a523400dd228c09c6f692a40cd875b4929a4b6aee2d7d7a3d49429fec6187

  • SSDEEP

    12288:zh6yZsNWgGHDo1THRQjtq0C2gYVxGrXL0jdjSa6pDMyjrE/8GbssOusqg:zhqGH6lQjtIZYEwhOagMcmJXkZ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1644755040:AAGRTnph6BdO8-t1bJaOyVu9aeuJErmisqs/sendMessage?chat_id=1637651323

Targets

    • Target

      PO BCA 210084.exe

    • Size

      582KB

    • MD5

      51bf91997f8dd9a6cb1abd28e7ad8e54

    • SHA1

      4f43da855eef5b0b0011bd0de58d0621d6c510e0

    • SHA256

      ea52bbd42da9e0a38915bf663dee48a58add23f62617f0178ea4906218936fa6

    • SHA512

      05db9028812291014df4f1cda452185c62f77ef907329ad219d2610673d4882231cac0557ec0b102becf88d2c9d93066ade4d1b313d32f4637c0b2e521076751

    • SSDEEP

      12288:91DDEt9utEjh0lcK4D6gjLrKZMONyftqvTB0Q:PK9uyjh+4D6gHrKHNyftql0Q

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks