General

  • Target

    efc7d02e2f0b147e72ff03b054de99e7_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240921-ph7cbascjj

  • MD5

    efc7d02e2f0b147e72ff03b054de99e7

  • SHA1

    1bde0445f489bbce2426e9757425168553499581

  • SHA256

    649f9f6ead85d535904aa3f25117823a0c6d1832c5362ee62404a7b55279fe1a

  • SHA512

    0dbfee2e8324f4ea2ff313a770a081a9096c3e1921c4ace14151963c949f001877096c5bb8a3b1dc9c998ffa0c0505a63e5d026c054f59492c98903a83fc1d49

  • SSDEEP

    12288:aCUIIeuQuojWsZi9701LJkIxYatI2lS/ng677jlz1Y3CPTpKkvhA9U6CQSiyyjK:J9ZHyIxA20/n1jDYSPTkkvC9Bd8

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1634002210:AAGipukUEr-bNBgl2R1_hwFgfb9ez_v6wzE/sendMessage?chat_id=1401219117

Targets

    • Target

      DHL_FORM_00029168873.exe

    • Size

      894KB

    • MD5

      6d5f919bcefabc102d81d5f747f4360f

    • SHA1

      471587727f4fc7bfa80c65fddb7776f857d3dec2

    • SHA256

      ac5d6e70caa2b1bde2cb167ff73f45fb54a80d23776869323612c426e7eab476

    • SHA512

      7dfbd3cc0127c737b09a97001f76507f974e29f07635655c7d4a0d8a8c33b3cc2499a3eff8ddd418f51f8e9ae8c92aa0de062b32cd0d51c37b2e8f83c13527cd

    • SSDEEP

      12288:mCUIIeuQuojWsZi9701LJkIxYatI2lS/ng677jlz1Y3CPTpKkvhA9U6CQSiyyjK:l9ZHyIxA20/n1jDYSPTkkvC9Bd8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks