General
-
Target
682a2b5504360f84d19cbd0ac2d8f311_JaffaCakes118
-
Size
550KB
-
Sample
241022-baqgyaxcka
-
MD5
682a2b5504360f84d19cbd0ac2d8f311
-
SHA1
209fce1244a1a352a30217bad21b8176e66f8883
-
SHA256
48ca2d86d3f94d2ec77c7bde9744f9c967186e7d6d61d7b72ff8e03858dfa838
-
SHA512
31a7220afc4c66e99e8df0bd5d865fb92a3f9a52ae7dccf7fece96f860f9956276260444bcb434df4af241e6389d7f2ceb9363cbd43d7bdaeb65bfbb9dee287e
-
SSDEEP
12288:80OepCqtlvWG8jluK8KfvlkLP96BWTv4CQ2aTEuqG8RPuP1k/bgtkX2avUEkrUDi:MCKUIv2bZbDVCu+T3
Static task
static1
Behavioral task
behavioral1
Sample
682a2b5504360f84d19cbd0ac2d8f311_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
682a2b5504360f84d19cbd0ac2d8f311_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
aMfYdLX3 - Email To:
[email protected]
Targets
-
-
Target
682a2b5504360f84d19cbd0ac2d8f311_JaffaCakes118
-
Size
550KB
-
MD5
682a2b5504360f84d19cbd0ac2d8f311
-
SHA1
209fce1244a1a352a30217bad21b8176e66f8883
-
SHA256
48ca2d86d3f94d2ec77c7bde9744f9c967186e7d6d61d7b72ff8e03858dfa838
-
SHA512
31a7220afc4c66e99e8df0bd5d865fb92a3f9a52ae7dccf7fece96f860f9956276260444bcb434df4af241e6389d7f2ceb9363cbd43d7bdaeb65bfbb9dee287e
-
SSDEEP
12288:80OepCqtlvWG8jluK8KfvlkLP96BWTv4CQ2aTEuqG8RPuP1k/bgtkX2avUEkrUDi:MCKUIv2bZbDVCu+T3
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-