General
-
Target
151d81c0018e122e475be12b2a381fa9_JaffaCakes118
-
Size
873KB
-
Sample
240627-h3edps1clq
-
MD5
151d81c0018e122e475be12b2a381fa9
-
SHA1
6c65d010b65057068b7ce481c9dec7aa4df38eb9
-
SHA256
fb697916a6e8662f63ff4823de89e3c3b18e2d372358d75181df294742513d65
-
SHA512
a8e8b8a256abcdc5a0b9d5f9a6aaecdcccecd341e08f2eeaf5d2340be1cc08418bea5264416d7224713906ad0eec4fb58e66d0b47e97eaed24f2ae7d940bf0fa
-
SSDEEP
24576:5LWWE+eCS9Jlbb//Dcw8m8vIhg+f5nQULH:5LReCShHznN8Ahgg5QULH
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Proforma Invoice.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sydneylaptops.com.au - Port:
587 - Username:
[email protected] - Password:
Ijeomam288@
Targets
-
-
Target
Proforma Invoice.exe
-
Size
1.1MB
-
MD5
bc8974efe8eaf656b8a193b3de5e6cd7
-
SHA1
e9759e7a7babfa9b0b409cbe3b17a5a8c0263fa4
-
SHA256
743515ad392665594a63eb8ce2432e2234733685d4d6c275c3d076f8b52182bf
-
SHA512
510bec96208cc514b13bb6352e1321d5c74a8676b7931161121045c6463c33e4f7c3e6f25b30c9ce33ede8112fc37cda5995dab3cfe6c8b8c00daa6e8b9ca34f
-
SSDEEP
12288:eP3w+24oEsHFYV4dQKK7v4k00sIxHplqGh/xZdFB9h/JkIS//SDeiq0D5kFkFwn4:GRoEslXMhlRlh/xZ7B9hGIMSDetMJP
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-