General
-
Target
a4f4ace29081f66063d5a8c61739dcb4_JaffaCakes118
-
Size
1.1MB
-
Sample
241127-avtjnaxnax
-
MD5
a4f4ace29081f66063d5a8c61739dcb4
-
SHA1
7ff750b4f4e21d265f28836bd28dc691d3e53125
-
SHA256
7ea9b98bca8ca5e1b8c7c850202d609181d645462ce39d16a920e25f12ad5b81
-
SHA512
29fb5ffbd5b89c6f4e4a0751b2562ab57de312f9fb58777efa4a67e93aa29979d6318bddfca2bcfbd81fdbc71bc67221521de432a77519615ad44f56eff7e187
-
SSDEEP
12288:kPZSZWEL1QAEomSpnr6rMRw2stLNDnuSmfWCE27/Jyirzl3TqcNy3R61R:khSZWEL1DZZQMRFKDnu7W927hrzl
Static task
static1
Behavioral task
behavioral1
Sample
a4f4ace29081f66063d5a8c61739dcb4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a4f4ace29081f66063d5a8c61739dcb4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
BkKMmzZ1
Targets
-
-
Target
a4f4ace29081f66063d5a8c61739dcb4_JaffaCakes118
-
Size
1.1MB
-
MD5
a4f4ace29081f66063d5a8c61739dcb4
-
SHA1
7ff750b4f4e21d265f28836bd28dc691d3e53125
-
SHA256
7ea9b98bca8ca5e1b8c7c850202d609181d645462ce39d16a920e25f12ad5b81
-
SHA512
29fb5ffbd5b89c6f4e4a0751b2562ab57de312f9fb58777efa4a67e93aa29979d6318bddfca2bcfbd81fdbc71bc67221521de432a77519615ad44f56eff7e187
-
SSDEEP
12288:kPZSZWEL1QAEomSpnr6rMRw2stLNDnuSmfWCE27/Jyirzl3TqcNy3R61R:khSZWEL1DZZQMRFKDnu7W927hrzl
-
Snakekeylogger family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-