General

  • Target

    db671e1ec4f71b051a4efe0cac7d09c1_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241209-y9mxesvpfm

  • MD5

    db671e1ec4f71b051a4efe0cac7d09c1

  • SHA1

    a31c7dee3d43b4c2fa103999d6ad4c5fca2caf73

  • SHA256

    8fc18a9ddfc44798d643184b165eb9019ad290d3dc7e81162c9e86759b8e529b

  • SHA512

    bf31b078afd065444cbf82e88d251d8ffa963d1f9686bd3d2b06555e9e6c636b01065269ca1696e7c6911a8224c805008aeda27bc33a877f1cb7c8db6b70a533

  • SSDEEP

    12288:/kJtPdGVDaHK7zTe++KINAeU+dy7fOhL8sCTqegHCcxvKIHWBSGm:cJYO+VluZL8sCTyHlZdH2S

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      QUOTATION URGENT PRODUCTION NEEDED FOR DINTEC ORDER LIST Ref 37470 RFQ PIP001 _scanned from e xerox multifunctional device0.exe

    • Size

      893KB

    • MD5

      804c2fb52752597cd0fdae9838df7d08

    • SHA1

      a5ebf568c0e7f81a5f6854ed9a690a948f804dd2

    • SHA256

      0a101b8b739c481e387e2daf5d85aaa93cf0188ff798233817e2e349b7ac1fe9

    • SHA512

      dfea22fcd622b5dd02f095e9148c68c9d135c654b1974a163253f783199895f58684b55b7994ba4e227c0f25463a1795460f97a94d3c92e421d5afe7819e6f27

    • SSDEEP

      12288:sJtPdGVDaHK7zTe++KINAeU+dy7fOhL8sCTqegHCcxvKIHWBSGm:sJYO+VluZL8sCTyHlZdH2S

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks