General
-
Target
47be20ce7a618d40f06ac0844686bc24_JaffaCakes118
-
Size
602KB
-
Sample
241015-pc6htsxeqm
-
MD5
47be20ce7a618d40f06ac0844686bc24
-
SHA1
bf0ddf316fbef3f3e843e73ac656196c8aa3b870
-
SHA256
b9b5c562bdc3101a2dc967576564710352c80d4eeb24e6e1fe68e5643c616205
-
SHA512
0975c9dc4ad343d1c96d6410e9f5efce7f652f6584d03f49ad095819f75b12324e52faf652d7b3f27bfa914782fdcf4e1b2dbf9c75f777f062bdb56f56fa7cea
-
SSDEEP
12288:PMrG9zZj4LJ/9hZ0W2Iw57lUB4XCkyFv/7DQeeyFLm:Uy9ghu3N7Glb74
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
M*eeFf@7 - Email To:
[email protected]
Targets
-
-
Target
Quotation.exe
-
Size
804KB
-
MD5
3c290037d606c31294f2a78bbf7ebf50
-
SHA1
c7b05d667d0349567a44aad7a6d085b7b13ccb0b
-
SHA256
e86dd6f8d70cbc4581e91e9728fd91ec5b760347ea9abe5a0b51dec8ca373cbc
-
SHA512
f50642e95d612cb3dfb8df55a8d0db2ce9c9d620996425cf7b429dd047841497f2f6b3a1b6204506b63480c08ec238f7f39eb96f4ec9e73d0cc2ace77a0739d2
-
SSDEEP
12288:QNdp1nqBwYran9ARHK7zbOS6F+Z1vmlng/s7MH13ivgAMVJBMOR1O+nQomGMM:QL0nrKAcvO3Fat+gsiSMVL1hBmd
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-