Behavioral task
behavioral1
Sample
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421.exe
Resource
win10v2004-20220901-en
General
-
Target
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421
-
Size
127KB
-
MD5
c193b51e0fff10d76d6f94dc1fc50f14
-
SHA1
fe05e48e25033f42bc91ae47901d4db7f208e32c
-
SHA256
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421
-
SHA512
d46595c45ef8ead535b8d69e1950ae22064e498f89e8f40755bc50aca6e660807f066e548e33496b3499465260cc6fc326fe3bcc5cfdcb623f2fa64e5504aa29
-
SSDEEP
1536:J5H8taABwPDvKtcf+Ce+vBUFrlYYeakHcYCcCWPQZcMFXCccb/UffIxDpiOWBI83:J5H8Y0UHf+beaHcb8HIxtwBI8mFbY
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
universaleagles-ye.com - Port:
587 - Username:
[email protected] - Password:
UEss@@202122
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
c80a05c35213b3be8658dd727ec315adb68be23328eb05bfcc12ad3a3017a421.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ