General
-
Target
JaffaCakes118_04e742e24ad87def9fde98879d33500bd07f799380e891d20d57a9c6395cdc16
-
Size
152KB
-
Sample
241229-c3h41aznbp
-
MD5
3cae608ed347184a6c2b9fbeb5c3736c
-
SHA1
c76bf032bba4d7018b8aa3b42acc0ce07cac552b
-
SHA256
04e742e24ad87def9fde98879d33500bd07f799380e891d20d57a9c6395cdc16
-
SHA512
f4e22488dc2e5055d44d13919873d305496639570baa29dd577696f6f9913a3fd2d285a5922e1dbbaa9fd75a42f6ec9383440fcd51ee53814b4885602227fb63
-
SSDEEP
3072:0FlAi/s+PkZu0eLTJ0LFvb81rzwBlhFbY:Avpx0LFvbkOfb
Behavioral task
behavioral1
Sample
JaffaCakes118_04e742e24ad87def9fde98879d33500bd07f799380e891d20d57a9c6395cdc16.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_04e742e24ad87def9fde98879d33500bd07f799380e891d20d57a9c6395cdc16.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5336865726:AAFldw6ldPqCHxYer8zB8WwmZVR7XynDkMo/sendMessage?chat_id=5178395696
Targets
-
-
Target
JaffaCakes118_04e742e24ad87def9fde98879d33500bd07f799380e891d20d57a9c6395cdc16
-
Size
152KB
-
MD5
3cae608ed347184a6c2b9fbeb5c3736c
-
SHA1
c76bf032bba4d7018b8aa3b42acc0ce07cac552b
-
SHA256
04e742e24ad87def9fde98879d33500bd07f799380e891d20d57a9c6395cdc16
-
SHA512
f4e22488dc2e5055d44d13919873d305496639570baa29dd577696f6f9913a3fd2d285a5922e1dbbaa9fd75a42f6ec9383440fcd51ee53814b4885602227fb63
-
SSDEEP
3072:0FlAi/s+PkZu0eLTJ0LFvb81rzwBlhFbY:Avpx0LFvbkOfb
-
Snake Keylogger payload
-
Snakekeylogger family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-