General

  • Target

    JaffaCakes118_ab3a4cad85edb4125901a8d528289fea4d109cf7f9e54ba10669eee1c53e0924

  • Size

    589KB

  • Sample

    241226-yy1ddaxqez

  • MD5

    0cd1f99482b135c2e95a9dcfd5f8cb76

  • SHA1

    1232eb4bcf4141c7ff8d6f9e1a4c90e50a72c3ca

  • SHA256

    ab3a4cad85edb4125901a8d528289fea4d109cf7f9e54ba10669eee1c53e0924

  • SHA512

    7018ca5dfd8a92793b1ffa30315263c9be9d90dfae982e51327acce49672f3838c634dc0574ece5e62211ec01baf31bd49f3e31cb95b045da40548bb5ac9192a

  • SSDEEP

    12288:gMzn03fq0gdTvTotbNQHwNy0Qy8XB3HPhCiH2Oloo3ik8S1N:gA0C0yTs7QHl04RXWOloUiON

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      11ba879203691cf383e6600a3812019bc3a9dd5da7643ace3e0168fd6d3f546f.exe

    • Size

      693KB

    • MD5

      c559dad2cd291b582073eb92adcb5692

    • SHA1

      c526dc71779d8678bbe7bcbcc440599fb0fa9e8b

    • SHA256

      11ba879203691cf383e6600a3812019bc3a9dd5da7643ace3e0168fd6d3f546f

    • SHA512

      4d885ee6c7b1fa153d44d09485dc3e87e6356f2d0fbaacf9292327c9679e3705978c61ce0e84dc5585ad0372baed5ce685d37adb70ca442582452928f9de7369

    • SSDEEP

      12288:zLcqXPoY39oo3F5/W+Ul8ndbXb7yBz0jb2d8Si0/d/MrSQDcTve2c:MjY3io3F93sAdbXb7yBEQi0N0FlN

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks