General
-
Target
ede697a91e18c73baf01ca677aa33917_JaffaCakes118
-
Size
634KB
-
Sample
240411-vceb8sba5t
-
MD5
ede697a91e18c73baf01ca677aa33917
-
SHA1
699f96d0a34bfacd78a8530f507769d5d18dccc5
-
SHA256
1e2785c94e1501731c09b13b6f8156548704a36dd5b220efab73c06ed4fd6bfc
-
SHA512
7725d2f003a2aeecfe85dff03654b60ea80914ea39b369d6314443600750f4e13ab04a1c7a0925314e1013af034c0c4640dc3f98b9034851cff6b91c3c518bd9
-
SSDEEP
12288:HqKPU97PU9KzsQeVs8DIjOsBgo0q4wMVbMVSfFwhU9Dibb5CyGqCrgI/3JVi/KH:Hq+xIjOsBgo0q4wMW8wiJibdRxCrv5VR
Static task
static1
Behavioral task
behavioral1
Sample
ede697a91e18c73baf01ca677aa33917_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ede697a91e18c73baf01ca677aa33917_JaffaCakes118.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bh-16.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
ede697a91e18c73baf01ca677aa33917_JaffaCakes118
-
Size
634KB
-
MD5
ede697a91e18c73baf01ca677aa33917
-
SHA1
699f96d0a34bfacd78a8530f507769d5d18dccc5
-
SHA256
1e2785c94e1501731c09b13b6f8156548704a36dd5b220efab73c06ed4fd6bfc
-
SHA512
7725d2f003a2aeecfe85dff03654b60ea80914ea39b369d6314443600750f4e13ab04a1c7a0925314e1013af034c0c4640dc3f98b9034851cff6b91c3c518bd9
-
SSDEEP
12288:HqKPU97PU9KzsQeVs8DIjOsBgo0q4wMVbMVSfFwhU9Dibb5CyGqCrgI/3JVi/KH:Hq+xIjOsBgo0q4wMW8wiJibdRxCrv5VR
Score10/10-
Snake Keylogger payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-