General
-
Target
e9859c2d23a7506437def96c67cd0e6f_JaffaCakes118
-
Size
473KB
-
Sample
240409-jw9fyaab73
-
MD5
e9859c2d23a7506437def96c67cd0e6f
-
SHA1
07182c463019a709bd2fa01504c986ad8283f1a6
-
SHA256
673bed05a0caf94c9158c96232ea78a37fb57f08b35ba2336825987f094313d3
-
SHA512
3bebd3880f0549b625ebb9d0d646e6c5b7f3308197c6bdaafca34d04adfb6325b0692b5b6cb44395fa77c90048a34f0d9237c509cc9e78ceebda0fafb0ec8ef8
-
SSDEEP
6144:YwNAATRfk/ZPCq28iGEJzKWHE5YA32cqT00zzQL+hQ5pU4OHEwwC7nPkoqHJFuZp:3rd+PpiGEJOMMQTSAemzJ7jkoqpssQh
Static task
static1
Behavioral task
behavioral1
Sample
e9859c2d23a7506437def96c67cd0e6f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9859c2d23a7506437def96c67cd0e6f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bh-alpha.bergeserver.com - Port:
587 - Username:
[email protected] - Password:
Hackerben11@ - Email To:
[email protected]
Targets
-
-
Target
e9859c2d23a7506437def96c67cd0e6f_JaffaCakes118
-
Size
473KB
-
MD5
e9859c2d23a7506437def96c67cd0e6f
-
SHA1
07182c463019a709bd2fa01504c986ad8283f1a6
-
SHA256
673bed05a0caf94c9158c96232ea78a37fb57f08b35ba2336825987f094313d3
-
SHA512
3bebd3880f0549b625ebb9d0d646e6c5b7f3308197c6bdaafca34d04adfb6325b0692b5b6cb44395fa77c90048a34f0d9237c509cc9e78ceebda0fafb0ec8ef8
-
SSDEEP
6144:YwNAATRfk/ZPCq28iGEJzKWHE5YA32cqT00zzQL+hQ5pU4OHEwwC7nPkoqHJFuZp:3rd+PpiGEJOMMQTSAemzJ7jkoqpssQh
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-