General
-
Target
eb11c51144aae060436f75639b38d347_JaffaCakes118
-
Size
671KB
-
Sample
240410-ppyzhsag71
-
MD5
eb11c51144aae060436f75639b38d347
-
SHA1
9b4fd38d56daf2b8863455f4b0c0ca7307ab1d37
-
SHA256
f63fb5cc22477bc30c62b92c018ad764392d5abefd9e389bba8ca9b85f5b1421
-
SHA512
eb49566036a331c0af6b1330e1937cf092c4e9a92932a733deb2bdc82b28dab8159ad34459dd2353ea6d40e3e29ddabf667af76250a024b28a947e183901cb82
-
SSDEEP
12288:q2TRBBPukNcEWECUxmnL4WITNxCcNRPvB6adUohAOStE+25:q2TDhpBeoL
Static task
static1
Behavioral task
behavioral1
Sample
eb11c51144aae060436f75639b38d347_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb11c51144aae060436f75639b38d347_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1914131597:AAEk7ho3IOyTPLqmScPeq-lvJXMNmllhMUw/sendMessage?chat_id=1482312326
Targets
-
-
Target
eb11c51144aae060436f75639b38d347_JaffaCakes118
-
Size
671KB
-
MD5
eb11c51144aae060436f75639b38d347
-
SHA1
9b4fd38d56daf2b8863455f4b0c0ca7307ab1d37
-
SHA256
f63fb5cc22477bc30c62b92c018ad764392d5abefd9e389bba8ca9b85f5b1421
-
SHA512
eb49566036a331c0af6b1330e1937cf092c4e9a92932a733deb2bdc82b28dab8159ad34459dd2353ea6d40e3e29ddabf667af76250a024b28a947e183901cb82
-
SSDEEP
12288:q2TRBBPukNcEWECUxmnL4WITNxCcNRPvB6adUohAOStE+25:q2TDhpBeoL
Score10/10-
Detect ZGRat V1
-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-