General

  • Target

    f1a48e54df9effe71974b8e913ef8467_JaffaCakes118

  • Size

    255KB

  • Sample

    240922-kavw4azepn

  • MD5

    f1a48e54df9effe71974b8e913ef8467

  • SHA1

    5265ab727e9f5db4a1416bec425de03f9d731688

  • SHA256

    d9087d6898aa511332629d568c7b3f7a66d67e2afada2fce5c91671d2e178f00

  • SHA512

    1b5c8e67a4e5ee6619638494d8b82b35bc6ccec73f3f4e503abc7c03572eb88dbc9d68f76c747b04a4f78bef8dfbb2d714510c53363f46694d41497efd9145b6

  • SSDEEP

    6144:bzP709BdJqBwnHcNWQFChpTJcfrhLYeKC7uZ36v7t3X:bzPcqiHcNWQFChpN6OZCM36J3X

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.potagrup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Pgrup@2021

Targets

    • Target

      PO0909898899.exe

    • Size

      778KB

    • MD5

      8b3f52c50a2a676c6c8767914eb7e5bc

    • SHA1

      2936603dba4c28a2b1999d6a72f1443d502ce486

    • SHA256

      6d3ffb896e637867433266d733f0a343f51e2bf02c0ee58cfc45967e650966ac

    • SHA512

      7c4fd27e0d7ecec3ef8f84b79f2f989783c3865d1b61717d8c58af23d1dd3a085cd6b627c0c1ea120803875443a7c9a915c02d5b0800acbf23b914fd7959204c

    • SSDEEP

      6144:NSDMpra6XVknq4yNLwNBXUtTpN7m7Vbvrvo:hp1FkL2c2pWx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks