General

  • Target

    fb38196980511ef6b202283294edba24_JaffaCakes118

  • Size

    644KB

  • Sample

    240928-bet1xs1dqf

  • MD5

    fb38196980511ef6b202283294edba24

  • SHA1

    2545bd9a51b598dfa88a0a375a1cb438d8c84769

  • SHA256

    e62dc48007b31d30d8235065968a9518028f30733f13c4e10995fb155e11f3d2

  • SHA512

    8d69b57169a3b6330a2460b9570293a444d889b9c2268c2814aea0606efb6886d400b5bcb0c364fb4d8465bc07ea7ee78468c57fe0e30389a426fdef0da09935

  • SSDEEP

    12288:vICbYQjoiuZ3JKGN9xtzdcwOpb6AZnreWa:QCbYQjoBZ3J1ZIF5tr

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1253930875:AAHtgtSce_nZyxAmWaCL8F3TRro9rp-ilvI/sendMessage?chat_id=1323227338

Targets

    • Target

      fb38196980511ef6b202283294edba24_JaffaCakes118

    • Size

      644KB

    • MD5

      fb38196980511ef6b202283294edba24

    • SHA1

      2545bd9a51b598dfa88a0a375a1cb438d8c84769

    • SHA256

      e62dc48007b31d30d8235065968a9518028f30733f13c4e10995fb155e11f3d2

    • SHA512

      8d69b57169a3b6330a2460b9570293a444d889b9c2268c2814aea0606efb6886d400b5bcb0c364fb4d8465bc07ea7ee78468c57fe0e30389a426fdef0da09935

    • SSDEEP

      12288:vICbYQjoiuZ3JKGN9xtzdcwOpb6AZnreWa:QCbYQjoBZ3J1ZIF5tr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks