General
-
Target
JaffaCakes118_ab3a4cad85edb4125901a8d528289fea4d109cf7f9e54ba10669eee1c53e0924
-
Size
589KB
-
Sample
241226-yy1ddaxqez
-
MD5
0cd1f99482b135c2e95a9dcfd5f8cb76
-
SHA1
1232eb4bcf4141c7ff8d6f9e1a4c90e50a72c3ca
-
SHA256
ab3a4cad85edb4125901a8d528289fea4d109cf7f9e54ba10669eee1c53e0924
-
SHA512
7018ca5dfd8a92793b1ffa30315263c9be9d90dfae982e51327acce49672f3838c634dc0574ece5e62211ec01baf31bd49f3e31cb95b045da40548bb5ac9192a
-
SSDEEP
12288:gMzn03fq0gdTvTotbNQHwNy0Qy8XB3HPhCiH2Oloo3ik8S1N:gA0C0yTs7QHl04RXWOloUiON
Static task
static1
Behavioral task
behavioral1
Sample
11ba879203691cf383e6600a3812019bc3a9dd5da7643ace3e0168fd6d3f546f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11ba879203691cf383e6600a3812019bc3a9dd5da7643ace3e0168fd6d3f546f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@# - Email To:
[email protected]
Targets
-
-
Target
11ba879203691cf383e6600a3812019bc3a9dd5da7643ace3e0168fd6d3f546f.exe
-
Size
693KB
-
MD5
c559dad2cd291b582073eb92adcb5692
-
SHA1
c526dc71779d8678bbe7bcbcc440599fb0fa9e8b
-
SHA256
11ba879203691cf383e6600a3812019bc3a9dd5da7643ace3e0168fd6d3f546f
-
SHA512
4d885ee6c7b1fa153d44d09485dc3e87e6356f2d0fbaacf9292327c9679e3705978c61ce0e84dc5585ad0372baed5ce685d37adb70ca442582452928f9de7369
-
SSDEEP
12288:zLcqXPoY39oo3F5/W+Ul8ndbXb7yBz0jb2d8Si0/d/MrSQDcTve2c:MjY3io3F93sAdbXb7yBEQi0N0FlN
-
Snake Keylogger payload
-
Snakekeylogger family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-