Behavioral task
behavioral1
Sample
1504-63-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1504-63-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1504-63-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
7f8f5a9d36b2500c050aea4f3c2a0727
-
SHA1
67d41fe95729d13d8a814e291784c97bee2c8e5f
-
SHA256
a61bcaa8ced100282c1ae245211bec2d96dfa4e4027f8f639472c00fdbadefa0
-
SHA512
72dff070ca206c89117c0f97ff0f99f19b4a6f3a029d36753a26caf4e26a21ddde8bb762e9298dbd08fff6ad2e516abb777364152fd2293ddf64c3e67a3fec56
-
SSDEEP
1536:6YxQA26PLQVJMJZjaf+vBUFrlYYm0kRAItMK+o8OaMF/7JGkOsUCBGb/UHhKgwHh:6YxQODXZjem08jwCYb8BKgwtAwBI2
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.vegalogistics-pl.com - Port:
587 - Username:
[email protected] - Password:
dZDvZi%z%8
https://api.telegram.org/bot5816458649:AAFS1obzDKYH_QeQC_kvYxhd80vhKb3q6Vs/sendMessage?chat_id=5586449047
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1504-63-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ