General

  • Target

    JaffaCakes118_2afbf0f6653bee108539a34c857c613e790fa162fc16d77af9f9a5155773657d

  • Size

    152KB

  • Sample

    241222-lq3gjstjgs

  • MD5

    0649b9ffd794448d56fbd85430d0f023

  • SHA1

    196e1365d8d862c932bd5b2b43a26cca78cd70ff

  • SHA256

    2afbf0f6653bee108539a34c857c613e790fa162fc16d77af9f9a5155773657d

  • SHA512

    d524ebc2f460d91b4b60c2f03ffa94a51e5392cd4033c1c3abf72fa350c93b0121e69064be8fc61faf445cb4b6ce5d1690126adb7fe6c6cc641c6ed8cf3e5e0f

  • SSDEEP

    3072:wFlAi/s+PkZu0eLT9b/Q4BPb8wzwBlFFbY:svpBI4BPbGbb

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5353503679:AAEJ2PXDCuq1nn55H7AnHpcP0d_3E3empJM/sendMessage?chat_id=5212306745

Targets

    • Target

      JaffaCakes118_2afbf0f6653bee108539a34c857c613e790fa162fc16d77af9f9a5155773657d

    • Size

      152KB

    • MD5

      0649b9ffd794448d56fbd85430d0f023

    • SHA1

      196e1365d8d862c932bd5b2b43a26cca78cd70ff

    • SHA256

      2afbf0f6653bee108539a34c857c613e790fa162fc16d77af9f9a5155773657d

    • SHA512

      d524ebc2f460d91b4b60c2f03ffa94a51e5392cd4033c1c3abf72fa350c93b0121e69064be8fc61faf445cb4b6ce5d1690126adb7fe6c6cc641c6ed8cf3e5e0f

    • SSDEEP

      3072:wFlAi/s+PkZu0eLT9b/Q4BPb8wzwBlFFbY:svpBI4BPbGbb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks