General

  • Target

    d702b465244361115b6974367ccf702d_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240909-ytq9xaxdmr

  • MD5

    d702b465244361115b6974367ccf702d

  • SHA1

    7fc0bdc13c6dc3f9a6faeb11a2223b94f2c7fa6a

  • SHA256

    9db30166127dd97862c8483553a059c0e29fa53b50ac17926b1eef55b63aa24f

  • SHA512

    8e4794ba37886445037ed300d1d1154a3f5768472baf02d94c1795344e6db6bf52836f4ca452b27cc714bf688664084d6ffaa14ba2c2ca1aaeafbcc9e528f9a7

  • SSDEEP

    24576:Sc+EINin0zh1YT3q+iSoSHYB15+CMdtnn0bLFbT7fL1SLaTUdKV:SRhon0zva3Wh1UL0bLpT7fuKV

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Updated SOA#8203204927107#.exe

    • Size

      2.7MB

    • MD5

      6f8faaa0b38d96d6a22e77ef6bb92c5e

    • SHA1

      5fb6a749371864c0a0a4c5be6faee65385126976

    • SHA256

      89f1983ad923c2485a4b4e06b168a096546d35fd90e88d26485756a37fc4a829

    • SHA512

      5c2207467d8b530f86c9d1140fe807d93ff5bbe536c2cb07ce125dc55a2409378dd7fbcbc6bddb0a09d6d0db51a727d075e1bd922b2f230489d20386c93aa241

    • SSDEEP

      49152:soZ0ajbQzlq5O+l4QOnn8jeX+l8uvlhfNf5lWLPNyeL9+hw/USGy7Xk/51HwgG9d:xX0zlC6mt98S2mnwQ1a7r

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks