General
-
Target
69464677baefefa9421510d0017a5920_JaffaCakes118
-
Size
576KB
-
Sample
241022-g3hkpatdqp
-
MD5
69464677baefefa9421510d0017a5920
-
SHA1
5b3cb88de34595ee2ba8973683be28927e3dd701
-
SHA256
316154ebe18ae1e80c63386a49a303e7dc3fdedb03d6940bc46cbc62e15a06cd
-
SHA512
51908559eab09a9692c5534d32280ef2e1fa02e02b552302cbf9bc9dd906c9c66cb4f15d1aefe7a755a3992bffc812d244e54a87f58fc0c6dc84c68073a3b76c
-
SSDEEP
12288:tHvaYHfHwmPVgqJjiG30YnxFTmKi0mMSurQyFlDh618B8Zz4ubp:tPdHBZJGGEYfm+mMSqQyFl4IGp
Static task
static1
Behavioral task
behavioral1
Sample
BANK INFORMATION.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BANK INFORMATION.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
25 - Username:
[email protected] - Password:
BkKMmzZ1 - Email To:
[email protected]
Targets
-
-
Target
BANK INFORMATION.exe
-
Size
678KB
-
MD5
680b0b10a8435b833bcd423df49b97c9
-
SHA1
2b7cee955568f6c999e7198a88b275145fff4a5f
-
SHA256
6cbef3935de6e3aa2f3b42bfe47b0ced92955f6635b14c617025068ebb45473a
-
SHA512
35565f047e85db6c19fdddc0ed0d8b89e91c06225383f1cf1c67a175ae30835abe61bf1e908144cedfd0cdda696077943ded477e7c428661551743789a8a8cfd
-
SSDEEP
12288:bmWOE2iNeHK7zDVkQa6NZQbqIWZM66/H3KU4hVJC0j5MKcXmP/:iWz1bWJjbW+66/69hVRCVXmP/
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-