General

  • Target

    JaffaCakes118_3059cf89548babd7f883f6669403711b

  • Size

    464KB

  • Sample

    250106-vwglpsslhx

  • MD5

    3059cf89548babd7f883f6669403711b

  • SHA1

    7c97d773f230f63eb7669370611986cd5c92f03a

  • SHA256

    853384b95098ae2591328fad181230b71e49dc55935af66056d6e505500ab8fa

  • SHA512

    6fefb43ceff9794466a4f88d98cc2a0e9fac47c8c9be2f3e0237da3e0302d2bdc2afbfe9fbb272bbe155423013411c9b09e13e9479a9ac9014b8d26fb3ed4b21

  • SSDEEP

    12288:j4C8+ZqG3cAh/AT6yTMXgxyEl36ctAoikdgZ:rzcG3jh/ATryEl33yugZ

Malware Config

Targets

    • Target

      JaffaCakes118_3059cf89548babd7f883f6669403711b

    • Size

      464KB

    • MD5

      3059cf89548babd7f883f6669403711b

    • SHA1

      7c97d773f230f63eb7669370611986cd5c92f03a

    • SHA256

      853384b95098ae2591328fad181230b71e49dc55935af66056d6e505500ab8fa

    • SHA512

      6fefb43ceff9794466a4f88d98cc2a0e9fac47c8c9be2f3e0237da3e0302d2bdc2afbfe9fbb272bbe155423013411c9b09e13e9479a9ac9014b8d26fb3ed4b21

    • SSDEEP

      12288:j4C8+ZqG3cAh/AT6yTMXgxyEl36ctAoikdgZ:rzcG3jh/ATryEl33yugZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/oezmnaybrma.dll

    • Size

      20KB

    • MD5

      e3e7ada7af7f7560a909eee23348cce6

    • SHA1

      8d41ded7481ee7f95816515c367116782932ef13

    • SHA256

      cba0d722c1e33b61881ac05c0db2cf088dd9702e76df979ab40f8c0dc1c053ab

    • SHA512

      8f80d8cc74c0add6a92fc4a3549db2633a1c71e10e192f12ca8fd8f223a99455f24d2aab441d3dce3fddd789b769b446613991cb54906deacc930e2f7e8d46f0

    • SSDEEP

      384:h8fmk9RJD7f+aPjoZ357iLezOo9qkT/4:h8flRJOZmBoE

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Blocklisted process makes network request

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks