General
-
Target
becd8371316c6ce0003a3beb62b9b471_JaffaCakes118
-
Size
1.0MB
-
Sample
241203-xrkhxaypbx
-
MD5
becd8371316c6ce0003a3beb62b9b471
-
SHA1
a5a5d5ae8644cb30a56c81c9a6811e7b3e1c1aaa
-
SHA256
ed38554e6ba513baec1a33967903263d06c6e131fbde04f80e2c315a81c113a2
-
SHA512
81d9d71a3b83fcba2598d86a5abf910d76554f1a505b6d3d5bb3aa503b8b5e246ef4ff1431fe1eb6b96cc66370d790497bb7338350b71a0cb8546b89c1e87769
-
SSDEEP
12288:EBDxYG420tPMugAUMQTakbZ5mVzWT/jFjVWyBOCJOULzxHXjFX2KaFo8flk8q:EBD+320hgAcTZfHTrO9C1lZX
Static task
static1
Behavioral task
behavioral1
Sample
becd8371316c6ce0003a3beb62b9b471_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
becd8371316c6ce0003a3beb62b9b471_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
bh-16.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Targets
-
-
Target
becd8371316c6ce0003a3beb62b9b471_JaffaCakes118
-
Size
1.0MB
-
MD5
becd8371316c6ce0003a3beb62b9b471
-
SHA1
a5a5d5ae8644cb30a56c81c9a6811e7b3e1c1aaa
-
SHA256
ed38554e6ba513baec1a33967903263d06c6e131fbde04f80e2c315a81c113a2
-
SHA512
81d9d71a3b83fcba2598d86a5abf910d76554f1a505b6d3d5bb3aa503b8b5e246ef4ff1431fe1eb6b96cc66370d790497bb7338350b71a0cb8546b89c1e87769
-
SSDEEP
12288:EBDxYG420tPMugAUMQTakbZ5mVzWT/jFjVWyBOCJOULzxHXjFX2KaFo8flk8q:EBD+320hgAcTZfHTrO9C1lZX
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-