General
-
Target
f1a68e045db072db6cc5ccfca53b5b11_JaffaCakes118
-
Size
606KB
-
Sample
241215-btzjyszngv
-
MD5
f1a68e045db072db6cc5ccfca53b5b11
-
SHA1
acdcecea1cdd7d215fd97b8323715ee0d5365897
-
SHA256
be95c3b8c727bf769a9ef892c42ff2a3ed9fe764d3297f3214e715e243c69995
-
SHA512
6e01b7b5d174cbb03a2c0625c29dea0e9a6052c501fb0f8ed2f629ad1875403820917a0e6289cb714df3937a4da268c822514e2b259abfa1ddb6d97765181f73
-
SSDEEP
12288:yDTR+PauuhVbdDtuki8QlXQze5rQ+ucgOXOXQexnymW3hJ+lcet:ycPauu3httbQlgyS+ucgOXOfnyIlH
Static task
static1
Behavioral task
behavioral1
Sample
BANK INFORMATION.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BANK INFORMATION.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
25 - Username:
[email protected] - Password:
BkKMmzZ1 - Email To:
[email protected]
Targets
-
-
Target
BANK INFORMATION.exe
-
Size
780KB
-
MD5
210f37c353be6b2739eaba795cd9b65a
-
SHA1
20bc7ff1b8e44e954290cd243d5f4eecb165b52a
-
SHA256
46ace3d6e4ad85d164526928dfc1827743f1f9caa7b46d342e211b807afaf55a
-
SHA512
ab96d81281aa8f09d86df31dd1bf900097e26778c6e3a557e746478fbc1fd3b0968aa0ea5891ff9f25abec373db9f6becf48edefa936abe7f0f06215b1bda2cd
-
SSDEEP
12288:R6rKqn3qGaNHEyC9/oR9gy5FHK7z9LQ5rMsYPCy+CobTDcQLiKE3dcF+P5FXpucl:RuKKPp9AR95yZAMszyiTDVWKE3zPX
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-