General
-
Target
803ddf2110717df4e3b5d67cf4c13ada_JaffaCakes118
-
Size
386KB
-
Sample
241030-xlbc2szbld
-
MD5
803ddf2110717df4e3b5d67cf4c13ada
-
SHA1
f5ceaecf0553624925dd1a752a8dba6d1d12de64
-
SHA256
1912a3115ca432819b123dcabc61253cef3504ad6f407504cd4539651ce51836
-
SHA512
0a20ca7334724c5438a6788f0384b7926d8369da73685fb52c6f2d2279fe289894ffb7a48ecbfecc49b306a067c3b510b1eeef167fae637c9c3253fa20a051c6
-
SSDEEP
6144:IcQ7u1YBcK2/HDNkOg1Ejaufi6vSznzWxQG0uGvqz4OjK8TrrG44Qz8rQ2tO:fQEeVkjNdpaQTvSznzUQGHGp6T36QzNb
Static task
static1
Behavioral task
behavioral1
Sample
296082809/296082809.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
296082809/296082809.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
#Euro123 - Email To:
[email protected]
Targets
-
-
Target
296082809/296082809.exe
-
Size
344KB
-
MD5
5af51fc97f4d1f73e0c9c5dad320d790
-
SHA1
f4cc96d4fed5be88d6f5c99c84a40e4f885ca668
-
SHA256
8f932a1a7d2e52db954b69678546a6481e9a68cf216d09f951bec33cb609008c
-
SHA512
d157cb87d18acc0e96f839a9557cb0dec25ba9c18564841549c45b470f4afcecedbabb11b443f0211d4e8665f34ad3908172f2e74090f3aa0af9fbc2ade7f257
-
SSDEEP
6144:PaJcibn+MKpGokPZi6siCNhCAWgn9JO2ceZqAENnMfFAGZUbO:SJcE+MKpGlwXJsAWg9YiZqAENn+F
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-