General

  • Target

    JaffaCakes118_06800b70b9d3985742ed32a23429e99f9d14d2116ca9e15ac8d9a838df93fd9d

  • Size

    312KB

  • Sample

    241222-feblsstpgt

  • MD5

    e6d95dc8557af3e3208337c0567f2f5f

  • SHA1

    10106583ea22f30d2950abd05a7fa4562db9a7ad

  • SHA256

    06800b70b9d3985742ed32a23429e99f9d14d2116ca9e15ac8d9a838df93fd9d

  • SHA512

    8307755651b3937f4a93eb1131b163d7bab55627a1c12b9af8a2d60404aa18495272c915758e3cfbcb44460eebc15b0661b58df1add63e6464337e4282393160

  • SSDEEP

    6144:DC2UnBBbxrZTsqKFFFFFFFFFFFFFDFFFFFFFFFFFFFFFFFFvN1vBSTeb:DC2Unxrl61vBH

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5453475689:AAEPtYkTq-8THTeKrYW8b68w6CGTVgKvmpM/sendMessage?chat_id=5798274961

Targets

    • Target

      JaffaCakes118_06800b70b9d3985742ed32a23429e99f9d14d2116ca9e15ac8d9a838df93fd9d

    • Size

      312KB

    • MD5

      e6d95dc8557af3e3208337c0567f2f5f

    • SHA1

      10106583ea22f30d2950abd05a7fa4562db9a7ad

    • SHA256

      06800b70b9d3985742ed32a23429e99f9d14d2116ca9e15ac8d9a838df93fd9d

    • SHA512

      8307755651b3937f4a93eb1131b163d7bab55627a1c12b9af8a2d60404aa18495272c915758e3cfbcb44460eebc15b0661b58df1add63e6464337e4282393160

    • SSDEEP

      6144:DC2UnBBbxrZTsqKFFFFFFFFFFFFFDFFFFFFFFFFFFFFFFFFvN1vBSTeb:DC2Unxrl61vBH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks