Behavioral task
behavioral1
Sample
860-65-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
860-65-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
860-65-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
24ea898401df1c3056ed9ad97f9a6fd5
-
SHA1
614c1cd536f8132ad30b8d458e49975ec24fba5a
-
SHA256
3302dc39646192344ddf03e5c271fc63dc4ccc11b812ef0afa991025d013456a
-
SHA512
89f1261786bbbd8b7c30c4c0de73453189ef6f49bb0d468709e8a28e87ea669ddb965ec11d4ad01dabf7a22f7d00203ca7d97716283e0c8f37d89d13c2d46bfc
-
SSDEEP
1536:jXcjMNpTsElQ93TiqTb0JTwk/8nxU/jb/UthvTJPpiOWBdFF0Kcl:jXcjSsC3qTb0JTdceb8phwBdFFbY
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
29mj4rLzNN^G - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
860-65-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ