Behavioral task
behavioral1
Sample
1784-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1784-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1784-64-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
0bb647331bc6c0c25099cacc48bac6dc
-
SHA1
0979efab5e3cad8f52ecde4270283703ba3a2363
-
SHA256
4539d28a40401c67d4a84ed0a4ace751c0325e0c6f258c78b145071caf2e5926
-
SHA512
13d1394c742ca31a101a2d4e5d742a3cd29f83f8687657b6cd706e4927ae6bd67e8f9dc9b297012679fdf7e76236e20d967184f2d456c6af5db41f86b58edb30
-
SSDEEP
1536:9NMrDAGKGbe/s1zi+hK5mMSnTrO2R4/B7bb/UJpo1vGNpiOWBm:9NMrsxsxJK5mMSnTfRKB7bb8A1vIwBm
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
shrisailogistics.com - Port:
587 - Username:
[email protected] - Password:
nfBD8_x.@Om)Btw147 - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1784-64-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ