Behavioral task
behavioral1
Sample
1324-68-0x0000000000400000-0x0000000000437000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1324-68-0x0000000000400000-0x0000000000437000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1324-68-0x0000000000400000-0x0000000000437000-memory.dmp
-
Size
220KB
-
MD5
b0196ac433f98b9f08a6c2b30bb56ebb
-
SHA1
dc4d4fc40a7471bbd164a8aeb17c787933118b88
-
SHA256
54933d2e42299cfbd0ac5b62d790255ae740da6357ccf7ebfc7cdbfe781fa81f
-
SHA512
5b1b216f9c2d36497c180b7b241d60551475f6e79a472b5f034ffb72a568b0a219bdbefb8ee96aa1880f40b350315a233dabb62a94d6e2aec1bd2531d861529a
-
SSDEEP
3072:pqqaM97eOTPiK3DruiiF/XbKjPk18l3AgAEcCv/IgOYrvQoLRDb8mYwBWjOzFbYt:oCteODDmzKBcFyI6jRDbkOpb6
Malware Config
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
1324-68-0x0000000000400000-0x0000000000437000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ