General
-
Target
435f32113eacbe46d3cf0b9de7b7f9fb_JaffaCakes118
-
Size
326KB
-
Sample
240713-z5e7fszdnc
-
MD5
435f32113eacbe46d3cf0b9de7b7f9fb
-
SHA1
d115b5acb72c2dab26f6602d25c0228432966a89
-
SHA256
48acccc6de63e6c3998ee2e8f141385c22db79ad40073bd15e49ac73f88bdba5
-
SHA512
0c1bde1a099a31a01de23bda2cfd94295133d58cd3577318543ecf010051f1913d8d5d344894c02f84c0f0a638ccc60826472e9559917f1d706476615c27bbf0
-
SSDEEP
6144:kRNThNT/r8YGoOtubn28O2N+3Q/1rdXzTdkiMD9U02nt+MVf:kbTTTj8YJOtuz28O2g3Q9rtaiMhUF+MJ
Static task
static1
Behavioral task
behavioral1
Sample
Order Quotation.pdf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Order Quotation.pdf.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sacauto.co.za - Port:
587 - Username:
[email protected] - Password:
#R0797967613 - Email To:
[email protected]
Targets
-
-
Target
Order Quotation.pdf.exe
-
Size
364KB
-
MD5
3e538a2bcfd2b69fd9bf65ff03c15df4
-
SHA1
9834ea82eaa4f9a6d93b1910f50b2af7864aa6f3
-
SHA256
8c0cdce2996d1a5ab9c8c3c83c28ec88bb0d6a88793bbcfaa1599d67f6a247d6
-
SHA512
be0d9ca4e8681838c77fd305e382b2d5576dcaf27b9442240e563dc9094ae20863b1ccf77f280b92696c0f1aa3bfa6e579402705c2d573e652f0677f501fe8cd
-
SSDEEP
6144:PIO/lGqodH+8eYU4ElxkPD2xOV7kWXizSiMgIhUzDSxzS/NDe3a+wlZcIL+F:PwVH+8b2sVGSidz+xzSsa+yiIL+
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-