General

  • Target

    JaffaCakes118_60100f98d7ccafbbe110e377ae3e17c2

  • Size

    630KB

  • Sample

    250107-njp9rayqbv

  • MD5

    60100f98d7ccafbbe110e377ae3e17c2

  • SHA1

    6aa77517f474e945f81db1df8b45bea5e8917593

  • SHA256

    ee344829b2ce25fc5bc242f1bb747cd201f4c7e9ef10d1e98c556110419197ab

  • SHA512

    2e78bbdecf8911c832bce5e50d34da4c3b0f26616e98f49d60b2373b9849eca0ae1722be36f672e930ff79b5764fe4acbb1e03c9dce8cbfd242f87dbe387a06e

  • SSDEEP

    12288:HkqhQKetZiE5xkfEikfxxluSNuEuJIz15p5uvZcy8jJ4xzVq/:hLeSQbfvuEcIt

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot1649974165:AAEw6GzBFS7fcRG392_tbbCihTBzve7azV0/sendMessage?chat_id=1684569143

Targets

    • Target

      JaffaCakes118_60100f98d7ccafbbe110e377ae3e17c2

    • Size

      630KB

    • MD5

      60100f98d7ccafbbe110e377ae3e17c2

    • SHA1

      6aa77517f474e945f81db1df8b45bea5e8917593

    • SHA256

      ee344829b2ce25fc5bc242f1bb747cd201f4c7e9ef10d1e98c556110419197ab

    • SHA512

      2e78bbdecf8911c832bce5e50d34da4c3b0f26616e98f49d60b2373b9849eca0ae1722be36f672e930ff79b5764fe4acbb1e03c9dce8cbfd242f87dbe387a06e

    • SSDEEP

      12288:HkqhQKetZiE5xkfEikfxxluSNuEuJIz15p5uvZcy8jJ4xzVq/:hLeSQbfvuEcIt

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks