Behavioral task
behavioral1
Sample
4268-130-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4268-130-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
4268-130-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
2628793663a5871f833b80bef30ebebb
-
SHA1
8795afa00d00216444cc3ad718301ca8552ae4c5
-
SHA256
95eb57df4d5fed2cfe71f6dbb7e0bc9bdc0174b92727b64eb00ed461733472d6
-
SHA512
6ceb082569114983385e268b898206a874af19a60cce20983c2148f03573a04c1f0844c361613279c60195ba74e02bc470a572af0ac36dd2840b69763a2964bd
-
SSDEEP
1536:Ea6ZMZN6tmT/CaC4QzHd6+vBUFrlYYWDkgKHc603SKyWMFJr9WXMMb/UKWAyHEJp:Ea6Z4E8XQzHQWDnb8KWXHkGwBBUbFbY
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
webmail.leavepostdesks.com - Port:
25 - Username:
[email protected] - Password:
Bigbrain2022# - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
4268-130-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ