General
-
Target
JaffaCakes118_3059cf89548babd7f883f6669403711b
-
Size
464KB
-
Sample
250106-vwglpsslhx
-
MD5
3059cf89548babd7f883f6669403711b
-
SHA1
7c97d773f230f63eb7669370611986cd5c92f03a
-
SHA256
853384b95098ae2591328fad181230b71e49dc55935af66056d6e505500ab8fa
-
SHA512
6fefb43ceff9794466a4f88d98cc2a0e9fac47c8c9be2f3e0237da3e0302d2bdc2afbfe9fbb272bbe155423013411c9b09e13e9479a9ac9014b8d26fb3ed4b21
-
SSDEEP
12288:j4C8+ZqG3cAh/AT6yTMXgxyEl36ctAoikdgZ:rzcG3jh/ATryEl33yugZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3059cf89548babd7f883f6669403711b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3059cf89548babd7f883f6669403711b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/oezmnaybrma.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/oezmnaybrma.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_3059cf89548babd7f883f6669403711b
-
Size
464KB
-
MD5
3059cf89548babd7f883f6669403711b
-
SHA1
7c97d773f230f63eb7669370611986cd5c92f03a
-
SHA256
853384b95098ae2591328fad181230b71e49dc55935af66056d6e505500ab8fa
-
SHA512
6fefb43ceff9794466a4f88d98cc2a0e9fac47c8c9be2f3e0237da3e0302d2bdc2afbfe9fbb272bbe155423013411c9b09e13e9479a9ac9014b8d26fb3ed4b21
-
SSDEEP
12288:j4C8+ZqG3cAh/AT6yTMXgxyEl36ctAoikdgZ:rzcG3jh/ATryEl33yugZ
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/oezmnaybrma.dll
-
Size
20KB
-
MD5
e3e7ada7af7f7560a909eee23348cce6
-
SHA1
8d41ded7481ee7f95816515c367116782932ef13
-
SHA256
cba0d722c1e33b61881ac05c0db2cf088dd9702e76df979ab40f8c0dc1c053ab
-
SHA512
8f80d8cc74c0add6a92fc4a3549db2633a1c71e10e192f12ca8fd8f223a99455f24d2aab441d3dce3fddd789b769b446613991cb54906deacc930e2f7e8d46f0
-
SSDEEP
384:h8fmk9RJD7f+aPjoZ357iLezOo9qkT/4:h8flRJOZmBoE
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-