General
-
Target
JaffaCakes118_1a48ab3724c838e76117fb4ee86271f27351377c978c482e647afd25dec71c4c
-
Size
502KB
-
Sample
241222-awrrfswjgw
-
MD5
56eaf98f1e5ba8dbed540473d31d65d3
-
SHA1
11c823452750ff5ee87639d75dc0505540ac3888
-
SHA256
1a48ab3724c838e76117fb4ee86271f27351377c978c482e647afd25dec71c4c
-
SHA512
c7b1d387484235e47fbaf73cc8e3870b3d7c9e9838d3f2c97b03d9e5d95ad696d58142ebb4fbe9093bf027deff4e872630f23a51f972afd4740a2984b8405d1f
-
SSDEEP
12288:tQ2h6fw7i3bDl6KXFAz+CdQiq7B3ZgH7etKuqeKUK7avV2IfySW3ra:thhqw7iHFByQigrtKwK7avIIf8ba
Static task
static1
Behavioral task
behavioral1
Sample
ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5764904494:AAFs_l-L1X-oXjUJWZbsXjBMAreHGetTJvw/sendMessage?chat_id=5582419717
Targets
-
-
Target
ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb.exe
-
Size
650KB
-
MD5
f41ef066384697b9536cb2a2ceb52597
-
SHA1
1a67aae992f751da11f38216c7acc21d49baaa50
-
SHA256
ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb
-
SHA512
8604d0950a69dc393c2fb50b73a47e8bf1762c95ab355beb1b1f48af9bf2d946dae2c74bb30b2a884551b26058b84e6e9a432fede668ed265091fc4fbc18372e
-
SSDEEP
12288:uSiZM/U057k2tnu6gTf+8iAQ/z6KVrEQSjb:8Ctnu6gtiPr6qox
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-