General
-
Target
63cbf77b6342a627ca96c0e5021794a4_JaffaCakes118
-
Size
666KB
-
Sample
241020-xk3e5swerk
-
MD5
63cbf77b6342a627ca96c0e5021794a4
-
SHA1
d7521e19982d54cf17ac513d606307a89a881b31
-
SHA256
f82c03c2fb967d594b083b5c743270a4f4306ddf2f90e28b39e8e56911ad915e
-
SHA512
2e95f7b697ef572269848607a01fa2def29d35b80bb5eac24db6f7bfaba756b6b0ef3e6c0658e78ac4ad0e68a795d6891fd04ae9c0a142047e1b5f47394d9860
-
SSDEEP
12288:NnqdP4PBPtSJzH2afTHx/ErEgFTl3UMZuWzVWW:4EBQxWafTHhErPTKM4WzwW
Static task
static1
Behavioral task
behavioral1
Sample
63cbf77b6342a627ca96c0e5021794a4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63cbf77b6342a627ca96c0e5021794a4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Blessings16 - Email To:
[email protected]
Targets
-
-
Target
63cbf77b6342a627ca96c0e5021794a4_JaffaCakes118
-
Size
666KB
-
MD5
63cbf77b6342a627ca96c0e5021794a4
-
SHA1
d7521e19982d54cf17ac513d606307a89a881b31
-
SHA256
f82c03c2fb967d594b083b5c743270a4f4306ddf2f90e28b39e8e56911ad915e
-
SHA512
2e95f7b697ef572269848607a01fa2def29d35b80bb5eac24db6f7bfaba756b6b0ef3e6c0658e78ac4ad0e68a795d6891fd04ae9c0a142047e1b5f47394d9860
-
SSDEEP
12288:NnqdP4PBPtSJzH2afTHx/ErEgFTl3UMZuWzVWW:4EBQxWafTHhErPTKM4WzwW
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-