General

  • Target

    07d26b190b7302dd7153f81a3be251c0_JaffaCakes118

  • Size

    609KB

  • Sample

    241001-29cm8svhpq

  • MD5

    07d26b190b7302dd7153f81a3be251c0

  • SHA1

    60e6706401e15fb0d83ede2d9d518963801213c5

  • SHA256

    19f2e87e5318afad4e60612a68cb610caa3306dab2004c56717224733d22baee

  • SHA512

    42ad74daaa572a9892cc7eea4116021b9cfb307f7e39191086f9d26bb3be51e09c25cfab8e9ecdf448b889ef3eb281bb7fd8e738dbfc84dee35648fa2350df52

  • SSDEEP

    12288:/KUAmvNgMMQqODPnIRQG1US26qXiZMdnJwlakbYUDWw3XZ1LLYSXmXR:/KUdq0i9

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      07d26b190b7302dd7153f81a3be251c0_JaffaCakes118

    • Size

      609KB

    • MD5

      07d26b190b7302dd7153f81a3be251c0

    • SHA1

      60e6706401e15fb0d83ede2d9d518963801213c5

    • SHA256

      19f2e87e5318afad4e60612a68cb610caa3306dab2004c56717224733d22baee

    • SHA512

      42ad74daaa572a9892cc7eea4116021b9cfb307f7e39191086f9d26bb3be51e09c25cfab8e9ecdf448b889ef3eb281bb7fd8e738dbfc84dee35648fa2350df52

    • SSDEEP

      12288:/KUAmvNgMMQqODPnIRQG1US26qXiZMdnJwlakbYUDWw3XZ1LLYSXmXR:/KUdq0i9

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks