General
-
Target
f1a9a3c3ac59a0b887d3b5c1ed980e31_JaffaCakes118
-
Size
818KB
-
Sample
240415-wn7nlafa3z
-
MD5
f1a9a3c3ac59a0b887d3b5c1ed980e31
-
SHA1
872577388d2492155af6b4a2f5738fb43c6a52e2
-
SHA256
7d5f45e05a65fbbcc78417cebda88591bc626b5a61643995d496c2a318270760
-
SHA512
54e75c9aebbe4727cd28eb4e3e42e20bf720149ea60f35dc49f20a52415d0d54152783b8c94b6124312e3906bb0b9eb0a7cf617d8ad159d4d069611724bdaf35
-
SSDEEP
24576:nT69pWfDaDtU3WSu6LEJwscCMpy8J284HJS1fbnHVm:bDaJlnJwscFpzJ28KebHVm
Static task
static1
Behavioral task
behavioral1
Sample
Project 4302021KSA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Project 4302021KSA.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
Project 4302021KSA.exe
-
Size
1.3MB
-
MD5
75dd111b19ce0b8dfaecccf2e12f44f9
-
SHA1
c16c31f8f80ea50065e39808bcdf7f4e8535497a
-
SHA256
55bd833636eeb445bd7e1ef5d23b5ce1a5bc26a3e6de305f37b8e285cec68443
-
SHA512
55b190fad095d1dd07d6f9104c15a2a9f36a0e1877ab68205f8adc781fc4fa2344a60774f55c5fa306eaa4a7d41f8d710b4e559ad40d8c225d10dfe76a3fc316
-
SSDEEP
24576:KoLemDiufx8DgMfx8Dgf49gsTfB5fihpQEGqscZCHLL:KoL9DT58DgM58DgfKg0PqQmZCr
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-