General

  • Target

    d6a5e38dd7edc20fa44ad2b0387dfa66_JaffaCakes118

  • Size

    523KB

  • Sample

    240909-ted9ksygja

  • MD5

    d6a5e38dd7edc20fa44ad2b0387dfa66

  • SHA1

    6ed44161238f8889d5d151e401479c9b25016158

  • SHA256

    7600f172b159ad55d68fe7a0e9f6fe7860926a9b5d6b3aadeb7c2de2a5354a26

  • SHA512

    ef2f69f12ff6d026fd40c99f340109911f71467d711e86ac8ae472edd0ddc8a1d8a327b0cd78f4447ed1b5f8e9595e5cb585a52acc04e01ec71a61bb71d48ccc

  • SSDEEP

    12288:GJK5gGn95ynyPb4gvB+0nGmck7+jSdRUlWLNbr+pgB4B6nstcXto4:GJ4kwvp+EBc9mwwYg2Ltc/

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1696248561:AAELXu6APanbtx1va3V24yWuQqYB4lDCkBI/sendMessage?chat_id=1594516081

Targets

    • Target

      SOA.exe

    • Size

      645KB

    • MD5

      b0be16b78d21ae5c42c8309fcb54cdaa

    • SHA1

      5777abdce97d2d3382bec264a1f2ebd9c9623e39

    • SHA256

      ac77fcbe1456c6fbc62e66bece175cc00a33eaab4353830c7fcf25116891ceac

    • SHA512

      4db8ad2d31d2cbb5d32a22376e4571483161ea861d3babcc501857c9b70fcb9fc78f1af70e44ffc2efd9af495ec411125494a61487f8f562e59f02330b82214e

    • SSDEEP

      12288:LXk1tn7HeIlPNodfFP6GefzDK9TrcfQfHBWLb9yV55hTVbBb:Lo7Z1odfFP6tWVtf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks