Behavioral task
behavioral1
Sample
4188-135-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4188-135-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4188-135-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
f9f4ff83968b5d57561d52894fd13edb
-
SHA1
c4a482c4a431f22d312a502202db6f8c1a37b224
-
SHA256
34eedd3d0b85b2b84883f0eba8a39bb003c6786ff5ddd276bd4b789dafe58617
-
SHA512
149e2902b812280c3015598e5e192e2466c0a44a0a23bf07a11335d87ba3b65583dc8990f79b04e2d218e656ef91989d7740ba400d97a20d195ddaeb6fa92f09
-
SSDEEP
3072:ImtcXls3DTs+8s/4RLjeq4aNb8OlwBZXFbY:I1ANsbO1b
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5786528789:AAHQ0j7i85-G-y75MjKxc4haUReZZXoIzEw/sendMessage?chat_id=5044499782
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
4188-135-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ