General

  • Target

    a82c79fde94745923161d70e357087af_JaffaCakes118

  • Size

    738KB

  • Sample

    241127-razcvawmfv

  • MD5

    a82c79fde94745923161d70e357087af

  • SHA1

    71cae27fb4a10eab6c50dedb02d625d80596a540

  • SHA256

    af5672497085dd27560917db1b83a913296d5335f898351a0eeab452644af109

  • SHA512

    c4abbd062ed2b02354eb001e9e7578c6998731abcb40de849e67f02717099331630255501ae55a628f175e624972ae71f0b5119677c5585c3e44406959499ae6

  • SSDEEP

    12288:6sroE0DGsAqEFjc7q5yxww3jC6gYEQoWmi/EQyaUVKnp:OEuGdnqAyxP3GiEhWmi/Oahp

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ecurs.ro/
  • Port:
    21
  • Username:
    no2ways@ecurs.ro
  • Password:
    dGZ5eznXv76y

Targets

    • Target

      a82c79fde94745923161d70e357087af_JaffaCakes118

    • Size

      738KB

    • MD5

      a82c79fde94745923161d70e357087af

    • SHA1

      71cae27fb4a10eab6c50dedb02d625d80596a540

    • SHA256

      af5672497085dd27560917db1b83a913296d5335f898351a0eeab452644af109

    • SHA512

      c4abbd062ed2b02354eb001e9e7578c6998731abcb40de849e67f02717099331630255501ae55a628f175e624972ae71f0b5119677c5585c3e44406959499ae6

    • SSDEEP

      12288:6sroE0DGsAqEFjc7q5yxww3jC6gYEQoWmi/EQyaUVKnp:OEuGdnqAyxP3GiEhWmi/Oahp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.