Behavioral task
behavioral1
Sample
1f53f14c48ecd545980d315ae494ea6a2bd99fa1e9a3671debdf80626942bd2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f53f14c48ecd545980d315ae494ea6a2bd99fa1e9a3671debdf80626942bd2c.exe
Resource
win10v2004-20220901-en
General
-
Target
1f53f14c48ecd545980d315ae494ea6a2bd99fa1e9a3671debdf80626942bd2c
-
Size
127KB
-
MD5
81709dd4178a8f3b8ac8e8c44bbff147
-
SHA1
26db6cd93cfeca8c77bf859543c9c2425db29748
-
SHA256
1f53f14c48ecd545980d315ae494ea6a2bd99fa1e9a3671debdf80626942bd2c
-
SHA512
fa06aa0a93770a04cd7dbfb33ff95a9963855f2f688fc0914e9ee8e8aca08dd1081b0ec2ebaf724bc245e97140d75cff62a18cd6b907406c862032cdf2aeb2ad
-
SSDEEP
3072:njId3DgXf+wuq2EqvhBibCsa2wB1rnbY:Sz2nLqvWbB6Lb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.a-standtasarim.com - Port:
587 - Username:
[email protected] - Password:
Saba1234@@ - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1f53f14c48ecd545980d315ae494ea6a2bd99fa1e9a3671debdf80626942bd2c.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ