Behavioral task
behavioral1
Sample
1988-61-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1988-61-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1988-61-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
a04d1144b3929202287cc9d39dbedc01
-
SHA1
36ec6830059d60917667830d967e96ec0c964e5c
-
SHA256
c2136bd9ec9eb0a180c093f324d2e308d4f8086357e7eb3b917c95b7fbe1d204
-
SHA512
14759ce0c8e10f2bf5dc2623c86b2f1b8861d1a98a7a05b4424c919094b7035e024137d8f5549e096f09b6537f1abb99bf5c822f5034ac7f4058b0264151c72a
-
SSDEEP
1536:HeEnCkmftM09Rj0t5tU+vBUFrlYYxjkQqSsqkXCqCnWMFZruxNzeb/UfeVZ0XpiQ:HeEnCzVrot5qxjHcmb8GPCwBjU
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5841268171:AAF5UCtwJJFHg-ZOPzcnm1oNf_eTuN08AjI/sendMessage?chat_id=1284939362
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1988-61-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ