Behavioral task
behavioral1
Sample
1328-65-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1328-65-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1328-65-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
fd5698405f21c37a9009a36b656f3811
-
SHA1
7f870f4f29690fc66d936ed3dd4512044fb68008
-
SHA256
28f6db70a63c7712e88e96b321fe13f2ae5ddabff0aa55f406fc33407f36c3de
-
SHA512
9da818d61d4a389da3bab5f6b89fc7bbf99b18eccd1570f88e5a4d5990507433926cec7b3d2b5e1f54d8a66a51d23b97071b8710073757dd00482b93d93d304c
-
SSDEEP
1536:wtgspH8sk+/cFp24eLThZvs6Tpblasb/U0/rwAApiOWBm:wtgspcsR/Ep24eLTzLTpRasb84ywBm
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
newstechindia.com - Port:
587 - Username:
[email protected] - Password:
DR{3fZ-zI=RD - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1328-65-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ