Behavioral task
behavioral1
Sample
824-63-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
824-63-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
824-63-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
73c9d28f181ec3c42897982af0113ff6
-
SHA1
d325aa800f3ada6f50b4fcd17dfe7b5bcd0b63b7
-
SHA256
ffee628d935b578a26015e3301415e69df92928e395bf2ca68adc9a9a3561008
-
SHA512
4679d5757689a4881062c27a39fdaab1c360cbaa7a8799a2a739802b7c5d539b15d86e9e8f0a752275ea9714c08d863922aaa5a4119ef4205de11252bc86b8bc
-
SSDEEP
3072:nYryR8uNnfQylUj4PsGKKb8dKvAhwBBU:lPNVOMP6KbIKXU
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.clubraqueta.es - Port:
587 - Username:
[email protected] - Password:
8mj8AYlo8jkSUoj - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
824-63-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ