Behavioral task
behavioral1
Sample
1880-68-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1880-68-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1880-68-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
5157ccbaada16f7f8a0104ab664d687f
-
SHA1
12a0cf71ea31eccd62b222edf540d435679dac13
-
SHA256
899000c4b26c771588d14b22456bd7b96a2fdf7c4bdc5bd3cac5588fc1a6a529
-
SHA512
5949de5582bd2bade45dcc590d3831a6e94e842749657e1ef9ff1643a0ab51c7cc81fc54c401bfc168349c8776c30181e9a000a344ff07f1387666951cbb644e
-
SSDEEP
1536:5tMpEqKKbw8U2nTZHEQnIr7bHXP/My2NOBmHbKuiQNhQIspiO5BAvI1Y:5tMK5Kc2TV47bf/L98bfVZGfB4w
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6273702310:AAGUtuDoY11m3LCVw0RgYYXqZb-1CRvB5Ok/sendMessage?chat_id=6143595836
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1880-68-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
1880-68-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ