General

  • Target

    19c6601c51dc66d4605a019f8408bad6_JaffaCakes118

  • Size

    404KB

  • Sample

    240628-mev4rsthng

  • MD5

    19c6601c51dc66d4605a019f8408bad6

  • SHA1

    3cda5f1a4d1b5d7f3b14e4b6121c470ffdfa1006

  • SHA256

    0a8cbc2874d563762b5bb87ce0b364dcc9e4deaadc72255912cd56ef4c1e9626

  • SHA512

    6c22287180e824e32c13113539d40efe294c479021fccf6ef1f8b54383899cff0598680349bd8f6fdd4d763e257660aeb67b5ab69b0d710d24f45240fab986dc

  • SSDEEP

    12288:FiQAJyy5TGwVqD74yhiYkz84fEDVMsvF1pwN:nAyy5TGTQyB94fYVvF1mN

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Scan Document-01.exe

    • Size

      712KB

    • MD5

      7bacaf5d7ba4ff6b91e3218c2ad0492f

    • SHA1

      8912236dbd1aabd99aeeeab5673583225a2b270e

    • SHA256

      a2fab87066e7f98d111198d98ad2de71322d5e4ec3f1f61e8147731299aff8d9

    • SHA512

      a2fb0e60693de6185bc2cfb96eec7401eb927ad5b33f827564d64506fc88795f5fd5ba5c35a62766f450545493d8b69dd2527be73ac21d88564fd6c10dd8ec40

    • SSDEEP

      12288:gCbYQjoiu83JU5FlaQRvlw3QVsKm0tYpdufAZnreFg1f+x:gCbYQjoB83JWFVvAQyz0tY5trb1f+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks