General
-
Target
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118
-
Size
1.2MB
-
Sample
240416-et8dmsbb6x
-
MD5
f2ab46c4d6035194f6bb1a3fde6ba2ae
-
SHA1
2db4d8e0ca62631d75302c0cd5c509c2158be5b1
-
SHA256
1b808f880f3ce7f3f2206b471efc9ae4655bf7cc69da90f1191cb5e1926517eb
-
SHA512
32454c0f23c02977a8016fc9cd372dc2943d86ea7f54f88d5f5d78df97aeb3a8443fad407f48820e918c02fea722bcb1dc386a4b3aa5d53c0474ea7a022846d6
-
SSDEEP
24576:8aS/d3xKzksLksqeSj3hEuXpastDNaRLbkkKzFZ/y8jh8N6ZN8Z:qKVSj5ZtDNaRLoH/+N6ZN8
Static task
static1
Behavioral task
behavioral1
Sample
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.ccmainoffice.com - Port:
587 - Username:
[email protected] - Password:
QAZqaz123@ - Email To:
[email protected]
Targets
-
-
Target
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118
-
Size
1.2MB
-
MD5
f2ab46c4d6035194f6bb1a3fde6ba2ae
-
SHA1
2db4d8e0ca62631d75302c0cd5c509c2158be5b1
-
SHA256
1b808f880f3ce7f3f2206b471efc9ae4655bf7cc69da90f1191cb5e1926517eb
-
SHA512
32454c0f23c02977a8016fc9cd372dc2943d86ea7f54f88d5f5d78df97aeb3a8443fad407f48820e918c02fea722bcb1dc386a4b3aa5d53c0474ea7a022846d6
-
SSDEEP
24576:8aS/d3xKzksLksqeSj3hEuXpastDNaRLbkkKzFZ/y8jh8N6ZN8Z:qKVSj5ZtDNaRLoH/+N6ZN8
Score10/10-
Snake Keylogger payload
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-