Behavioral task
behavioral1
Sample
5056-140-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5056-140-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
5056-140-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
59a6b3cf747080d266203fd2f1b76893
-
SHA1
a24c79112d68471b48a53f874fa5b49bf1da233b
-
SHA256
0fac72eed9aad9476a1085a34403814326bdc2dc30f1402dff8d3ff69e5056dd
-
SHA512
58729e282305c5be5b960d20fb8412e2336964a6afd82389c3265533d2c3c768af0cc882cde42963d9d5798a3de60dd93fa3d4cda5e68625c6d17ea58ca17397
-
SSDEEP
3072:HlOkzasxzdaPoFTgCM4zb8dlAawBmZFbY:ZVlMQbSlAQHb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
doDHyw%0 - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
5056-140-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ