General

  • Target

    JaffaCakes118_1a48ab3724c838e76117fb4ee86271f27351377c978c482e647afd25dec71c4c

  • Size

    502KB

  • Sample

    241222-awrrfswjgw

  • MD5

    56eaf98f1e5ba8dbed540473d31d65d3

  • SHA1

    11c823452750ff5ee87639d75dc0505540ac3888

  • SHA256

    1a48ab3724c838e76117fb4ee86271f27351377c978c482e647afd25dec71c4c

  • SHA512

    c7b1d387484235e47fbaf73cc8e3870b3d7c9e9838d3f2c97b03d9e5d95ad696d58142ebb4fbe9093bf027deff4e872630f23a51f972afd4740a2984b8405d1f

  • SSDEEP

    12288:tQ2h6fw7i3bDl6KXFAz+CdQiq7B3ZgH7etKuqeKUK7avV2IfySW3ra:thhqw7iHFByQigrtKwK7avIIf8ba

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5764904494:AAFs_l-L1X-oXjUJWZbsXjBMAreHGetTJvw/sendMessage?chat_id=5582419717

Targets

    • Target

      ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb.exe

    • Size

      650KB

    • MD5

      f41ef066384697b9536cb2a2ceb52597

    • SHA1

      1a67aae992f751da11f38216c7acc21d49baaa50

    • SHA256

      ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb

    • SHA512

      8604d0950a69dc393c2fb50b73a47e8bf1762c95ab355beb1b1f48af9bf2d946dae2c74bb30b2a884551b26058b84e6e9a432fede668ed265091fc4fbc18372e

    • SSDEEP

      12288:uSiZM/U057k2tnu6gTf+8iAQ/z6KVrEQSjb:8Ctnu6gtiPr6qox

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks