Behavioral task
behavioral1
Sample
1468-67-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1468-67-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1468-67-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
a9d452c536ff3ac33de34f04b489a99c
-
SHA1
35c690b23962775289661c6041a617830f9293a8
-
SHA256
f5b3ccb540a244dbbd8f0915fe1eeb9302f84bbbda16fd2efad3c29d307e77f2
-
SHA512
0ec440cb54ebb0434e421f1b36d283132c6198a352fe80bc907903e64ef61fc27b501c9080bd2ef72414340aff24310288e2d90d122c2a87e8572625ce421e7e
-
SSDEEP
1536:hs8qlljwsMN8CnqBYi3HsHggCtnb/UNK+piOWBbR:hs8qj8sUXnqBYi3HsAzVb8bwBbR
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.stilltech.ro - Port:
587 - Username:
[email protected] - Password:
eurobit555ro - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1468-67-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ