Behavioral task
behavioral1
Sample
696-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
696-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
696-64-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
f48a6992ba93dfd462624bfd6f5bce62
-
SHA1
10dd90fdbe241f17f0d20de5465394df77233bf3
-
SHA256
f05fa461a63e4ecd6e763a937b94b734e5765574742307a1509335ef8fff0d72
-
SHA512
88d9b2e9ca1dced76ce204273485e64d0cef23e6d62d29e76b1082250544d9cf52059886fdabb60b2bac7a66eb71bf924df65fc8f2fe69b1874b53f5ca6fc4c6
-
SSDEEP
1536:hAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFVnVFF3RMWFyobp:hAgAEkoHj/LDdfDRlb8py1VwBj26FbY
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 696-64-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
696-64-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ