Behavioral task
behavioral1
Sample
736-62-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
736-62-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
736-62-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
8bc2891b1fdc7e017b399bc4049776d0
-
SHA1
f31301ffa6bef153ca56d14bd83139100c386f12
-
SHA256
b674945aceea009718d1cf0289072b58a96313406a9c50b958762af5e360e9bc
-
SHA512
9b51df92c20649e51d4f85b77d9c55afcf7ef9bf829f5222ffd17947d61910019c5206bb872204e29c79ab966123585f1557d4fb279b48393e9a61ce6c893a3e
-
SSDEEP
1536:23cNEo1lwGcdTQo5sUJfctd/fEz/ckZnrG+ab/UhPgO7piO5Bg8V:kcNEqwBZVsUIlfS0kZa+ab83VfBg8
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.cerranor.com - Port:
587 - Username:
[email protected] - Password:
RxrpS#f2 - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
736-62-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ