General

  • Target

    803ddf2110717df4e3b5d67cf4c13ada_JaffaCakes118

  • Size

    386KB

  • Sample

    241030-xlbc2szbld

  • MD5

    803ddf2110717df4e3b5d67cf4c13ada

  • SHA1

    f5ceaecf0553624925dd1a752a8dba6d1d12de64

  • SHA256

    1912a3115ca432819b123dcabc61253cef3504ad6f407504cd4539651ce51836

  • SHA512

    0a20ca7334724c5438a6788f0384b7926d8369da73685fb52c6f2d2279fe289894ffb7a48ecbfecc49b306a067c3b510b1eeef167fae637c9c3253fa20a051c6

  • SSDEEP

    6144:IcQ7u1YBcK2/HDNkOg1Ejaufi6vSznzWxQG0uGvqz4OjK8TrrG44Qz8rQ2tO:fQEeVkjNdpaQTvSznzUQGHGp6T36QzNb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      296082809/296082809.exe

    • Size

      344KB

    • MD5

      5af51fc97f4d1f73e0c9c5dad320d790

    • SHA1

      f4cc96d4fed5be88d6f5c99c84a40e4f885ca668

    • SHA256

      8f932a1a7d2e52db954b69678546a6481e9a68cf216d09f951bec33cb609008c

    • SHA512

      d157cb87d18acc0e96f839a9557cb0dec25ba9c18564841549c45b470f4afcecedbabb11b443f0211d4e8665f34ad3908172f2e74090f3aa0af9fbc2ade7f257

    • SSDEEP

      6144:PaJcibn+MKpGokPZi6siCNhCAWgn9JO2ceZqAENnMfFAGZUbO:SJcE+MKpGlwXJsAWg9YiZqAENn+F

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks