Behavioral task
behavioral1
Sample
372-140-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
372-140-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
372-140-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
934506d33a3f66eeb5baa00013000516
-
SHA1
a0ac03d8a17e4794bc92f9c76401a50306ace2d0
-
SHA256
0a963386dd9aca47f1d8eb7cd345805e85b86fbb9f93b9a549bfc7c8dccd61b6
-
SHA512
4983cd3a1fe2525ab58793713c0c68ddb35923088cc4ec1a5579fe8014f5cc32dffdcdc7b713551290b337c8c15c29e311004e6d72ebdc617f57cd3449c43e67
-
SSDEEP
3072:8Edue1zIXuhUzvyS4/SHmb8b7cpRfBI8EFbY:FpI33CNbD28Qb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.condominioaocubo.pt - Port:
587 - Username:
[email protected] - Password:
Allfix.4321 - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
372-140-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ