General
-
Target
7d7f5443960ea2d566074345cd6c8e5e_JaffaCakes118
-
Size
820KB
-
Sample
241030-b8d7kathrl
-
MD5
7d7f5443960ea2d566074345cd6c8e5e
-
SHA1
8fe64c800889c947b65c7ff4d06a2467dca8b87f
-
SHA256
58e67590067912be3b544cffbdf3c0e2e6800e940bc377537399a0df06dd6992
-
SHA512
2025962f5b0a468504d19fb377e4bf8236732f5f42c8e5d4bd3695c5949f40e2a5e7dc76564e0884a825f3c2aac382fefca1e89284766e2cd4dd08af14f6d624
-
SSDEEP
24576:CfoKXPp9AR95y+fCoIw5ErcLuEmXxvdZ3:6VPpKRyoytjhv
Static task
static1
Behavioral task
behavioral1
Sample
7d7f5443960ea2d566074345cd6c8e5e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d7f5443960ea2d566074345cd6c8e5e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.fireacoustics.com - Port:
587 - Username:
[email protected] - Password:
_d:rzD~62Jxh - Email To:
[email protected]
Targets
-
-
Target
7d7f5443960ea2d566074345cd6c8e5e_JaffaCakes118
-
Size
820KB
-
MD5
7d7f5443960ea2d566074345cd6c8e5e
-
SHA1
8fe64c800889c947b65c7ff4d06a2467dca8b87f
-
SHA256
58e67590067912be3b544cffbdf3c0e2e6800e940bc377537399a0df06dd6992
-
SHA512
2025962f5b0a468504d19fb377e4bf8236732f5f42c8e5d4bd3695c5949f40e2a5e7dc76564e0884a825f3c2aac382fefca1e89284766e2cd4dd08af14f6d624
-
SSDEEP
24576:CfoKXPp9AR95y+fCoIw5ErcLuEmXxvdZ3:6VPpKRyoytjhv
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-