General
-
Target
e811b938aa862c56cb9c74ff75b1cd1c_JaffaCakes118
-
Size
524KB
-
Sample
240408-whsmgsfd38
-
MD5
e811b938aa862c56cb9c74ff75b1cd1c
-
SHA1
cf0f39183c879876a3c432fa3f2f61ace9f4e92d
-
SHA256
e4f0202ed5502ab39c6e8a524e622710a44c0cb4774864168cfbdb50acdfc7e0
-
SHA512
8b87387f4e00d94c12d3f328f03283512d8dc85696719ea63694c312d14c8da4f067a14b85c38b630e9e5775e0d4d88d9c1a231422fe19e745edc169f5657808
-
SSDEEP
12288:oRzX6hpWNDsrc8sga90a+MQ67KeM0dI7CGttinQtRI1BRXu4Pd:oFSQsrE99e
Static task
static1
Behavioral task
behavioral1
Sample
e811b938aa862c56cb9c74ff75b1cd1c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e811b938aa862c56cb9c74ff75b1cd1c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1869381239:AAHBvxvMGCld7ba_XOftDtH1sFpxJJa1PMM/sendMessage?chat_id=1753229729
Targets
-
-
Target
e811b938aa862c56cb9c74ff75b1cd1c_JaffaCakes118
-
Size
524KB
-
MD5
e811b938aa862c56cb9c74ff75b1cd1c
-
SHA1
cf0f39183c879876a3c432fa3f2f61ace9f4e92d
-
SHA256
e4f0202ed5502ab39c6e8a524e622710a44c0cb4774864168cfbdb50acdfc7e0
-
SHA512
8b87387f4e00d94c12d3f328f03283512d8dc85696719ea63694c312d14c8da4f067a14b85c38b630e9e5775e0d4d88d9c1a231422fe19e745edc169f5657808
-
SSDEEP
12288:oRzX6hpWNDsrc8sga90a+MQ67KeM0dI7CGttinQtRI1BRXu4Pd:oFSQsrE99e
Score10/10-
Detect ZGRat V1
-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-