General
-
Target
a82c79fde94745923161d70e357087af_JaffaCakes118
-
Size
738KB
-
Sample
241127-razcvawmfv
-
MD5
a82c79fde94745923161d70e357087af
-
SHA1
71cae27fb4a10eab6c50dedb02d625d80596a540
-
SHA256
af5672497085dd27560917db1b83a913296d5335f898351a0eeab452644af109
-
SHA512
c4abbd062ed2b02354eb001e9e7578c6998731abcb40de849e67f02717099331630255501ae55a628f175e624972ae71f0b5119677c5585c3e44406959499ae6
-
SSDEEP
12288:6sroE0DGsAqEFjc7q5yxww3jC6gYEQoWmi/EQyaUVKnp:OEuGdnqAyxP3GiEhWmi/Oahp
Static task
static1
Behavioral task
behavioral1
Sample
a82c79fde94745923161d70e357087af_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a82c79fde94745923161d70e357087af_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.ecurs.ro/ - Port:
21 - Username:
[email protected] - Password:
dGZ5eznXv76y
Targets
-
-
Target
a82c79fde94745923161d70e357087af_JaffaCakes118
-
Size
738KB
-
MD5
a82c79fde94745923161d70e357087af
-
SHA1
71cae27fb4a10eab6c50dedb02d625d80596a540
-
SHA256
af5672497085dd27560917db1b83a913296d5335f898351a0eeab452644af109
-
SHA512
c4abbd062ed2b02354eb001e9e7578c6998731abcb40de849e67f02717099331630255501ae55a628f175e624972ae71f0b5119677c5585c3e44406959499ae6
-
SSDEEP
12288:6sroE0DGsAqEFjc7q5yxww3jC6gYEQoWmi/EQyaUVKnp:OEuGdnqAyxP3GiEhWmi/Oahp
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-