General
-
Target
JaffaCakes118_60100f98d7ccafbbe110e377ae3e17c2
-
Size
630KB
-
Sample
250107-njp9rayqbv
-
MD5
60100f98d7ccafbbe110e377ae3e17c2
-
SHA1
6aa77517f474e945f81db1df8b45bea5e8917593
-
SHA256
ee344829b2ce25fc5bc242f1bb747cd201f4c7e9ef10d1e98c556110419197ab
-
SHA512
2e78bbdecf8911c832bce5e50d34da4c3b0f26616e98f49d60b2373b9849eca0ae1722be36f672e930ff79b5764fe4acbb1e03c9dce8cbfd242f87dbe387a06e
-
SSDEEP
12288:HkqhQKetZiE5xkfEikfxxluSNuEuJIz15p5uvZcy8jJ4xzVq/:hLeSQbfvuEcIt
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60100f98d7ccafbbe110e377ae3e17c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60100f98d7ccafbbe110e377ae3e17c2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
iwRaBVG6 - Email To:
[email protected]
https://api.telegram.org/bot1649974165:AAEw6GzBFS7fcRG392_tbbCihTBzve7azV0/sendMessage?chat_id=1684569143
Targets
-
-
Target
JaffaCakes118_60100f98d7ccafbbe110e377ae3e17c2
-
Size
630KB
-
MD5
60100f98d7ccafbbe110e377ae3e17c2
-
SHA1
6aa77517f474e945f81db1df8b45bea5e8917593
-
SHA256
ee344829b2ce25fc5bc242f1bb747cd201f4c7e9ef10d1e98c556110419197ab
-
SHA512
2e78bbdecf8911c832bce5e50d34da4c3b0f26616e98f49d60b2373b9849eca0ae1722be36f672e930ff79b5764fe4acbb1e03c9dce8cbfd242f87dbe387a06e
-
SSDEEP
12288:HkqhQKetZiE5xkfEikfxxluSNuEuJIz15p5uvZcy8jJ4xzVq/:hLeSQbfvuEcIt
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-