Behavioral task
behavioral1
Sample
1312-62-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1312-62-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1312-62-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
fbddb27687955695908bd85d01e4320a
-
SHA1
48d002115c99c261236e1fd111d5bb1b3e140e57
-
SHA256
0824b113797dedc9e837ae87dc6e55b7577e731683470724dd91cd0b02aceaaa
-
SHA512
b028b27aaf7d596027e01f5bf39ecc1832efa18cba35f4dcafc48390390046cab718dd947dd3c52af09e2316b95ce88eb4d20598f918be7eb553d8e2ae10d383
-
SSDEEP
1536:ctMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFFnwxJcrbKu5f99i5piOWB:ctMKH7/tDZvwxJ4bfRLi7wB
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5816308075:AAFAHgyFsBJDNSX2LHn4UAAqe1sHrGMznc4/sendMessage?chat_id=5857548246
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1312-62-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
1312-62-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ