General
-
Target
1ea72895c4c7f412c3bd5aa4150a3a89_JaffaCakes118
-
Size
1.0MB
-
Sample
241008-awfdestgmg
-
MD5
1ea72895c4c7f412c3bd5aa4150a3a89
-
SHA1
cadf819318af8dfd3b95b19d374fbd57dddf89f6
-
SHA256
b0476ad99bea620c89a4a582981a14e58dc68ff63d85ec96c26b92773263c485
-
SHA512
867b25388193ff58e072eac2673b2fa7811d7da98969445f8bb00271d8ca4af2aa1ac2920dde3b66f7b3e6afa851d3fd49ec3fe0881b2d7171e8f0675eddf016
-
SSDEEP
12288:CanCc73IJTMs7a7faf71SRRRVoYAC0aJZPcLWsPJRD0WSSu/tdrWfyU:hI+fSqvf0aJZPKW
Static task
static1
Behavioral task
behavioral1
Sample
1ea72895c4c7f412c3bd5aa4150a3a89_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1ea72895c4c7f412c3bd5aa4150a3a89_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.titan.email - Port:
587 - Username:
[email protected] - Password:
M3rafaelM!@# - Email To:
[email protected]
Targets
-
-
Target
1ea72895c4c7f412c3bd5aa4150a3a89_JaffaCakes118
-
Size
1.0MB
-
MD5
1ea72895c4c7f412c3bd5aa4150a3a89
-
SHA1
cadf819318af8dfd3b95b19d374fbd57dddf89f6
-
SHA256
b0476ad99bea620c89a4a582981a14e58dc68ff63d85ec96c26b92773263c485
-
SHA512
867b25388193ff58e072eac2673b2fa7811d7da98969445f8bb00271d8ca4af2aa1ac2920dde3b66f7b3e6afa851d3fd49ec3fe0881b2d7171e8f0675eddf016
-
SSDEEP
12288:CanCc73IJTMs7a7faf71SRRRVoYAC0aJZPcLWsPJRD0WSSu/tdrWfyU:hI+fSqvf0aJZPKW
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-