General
-
Target
JaffaCakes118_b4fab30e3e48d0b9f565b1ba0aeb34a9c340bc67e71b34cc24a96224ad2577e2
-
Size
289KB
-
Sample
241225-rbp6kavlhj
-
MD5
f3b19bc7454f0585e6016d94d7d8821c
-
SHA1
393b27819acc6aed94aff07fd5a3e19debe3723d
-
SHA256
b4fab30e3e48d0b9f565b1ba0aeb34a9c340bc67e71b34cc24a96224ad2577e2
-
SHA512
3033a859bad3aec036aa6bab5fd1a12c915352f4dfaba7f1d80ed43c1a282e6793bc06167799286211d10d17c6e5484d60c079ce45dc698a3259bf0780b6528d
-
SSDEEP
6144:qEkBva/Ua7M5So2ZhO8rsG+Q00v0Amre9MgQQWU61yqpSjOqc4:qEkxa/Ua7M5R2ZhXs+mS91QQt6g6SyqF
Static task
static1
Behavioral task
behavioral1
Sample
a52d9b136a8a439dab2da1d870ab2a75d2847817191bc785e3894c95b9c9eff7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a52d9b136a8a439dab2da1d870ab2a75d2847817191bc785e3894c95b9c9eff7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5231087432:AAGpDNiylOvJ21KejYNZPyeLSQa-u4GJlU4/sendMessage?chat_id=1474445387
Targets
-
-
Target
a52d9b136a8a439dab2da1d870ab2a75d2847817191bc785e3894c95b9c9eff7
-
Size
414KB
-
MD5
7df48a735cf653a7cdfafdacfa18e9fe
-
SHA1
8392410562ae6bb1d8792f7e82cc78d334136c10
-
SHA256
a52d9b136a8a439dab2da1d870ab2a75d2847817191bc785e3894c95b9c9eff7
-
SHA512
a3721db0f5abfed191975bac48d7d10f0ee34304e2384080fdb501b7ff45bbb9f58d805103c1fb340ae28e799befd49f4723548a1ca83cbbcc66d21518ee11c3
-
SSDEEP
6144:Hg0GgLaOwh3biYqc0kpScxhBryo0aVJchfoWUC8Qr+1vFZnyBTgwLr4h6/qA2ur:A0GgLCh3b/msfurawWq8Ntu/J
-
Snake Keylogger payload
-
Snakekeylogger family
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-