Behavioral task
behavioral1
Sample
4608-139-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4608-139-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4608-139-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
a576f2d1956fac89f9326667ed28efd6
-
SHA1
e7eb36e432f25ecf7001a5c6b0e29916b0b1c93f
-
SHA256
17a3e3743ac4ec65e8918fdffadd10406ceef6fed0796dde47cc4bc31b4230ae
-
SHA512
3e446675c9e36fc595ae2e9dab2891a8e445b97e44ecdbe644d2d9f31ac64a0bfc6e3cdac39083e0a68c2876c6adf6c295cea9b887d0380f729207b88f5f3b8e
-
SSDEEP
3072:0H96cs6v85wcP3Hd6GXgb8gQVwBO5FbY:Rtvo9b4Pnb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
4608-139-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ