Behavioral task
behavioral1
Sample
1412-63-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1412-63-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1412-63-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
b0430cf7d74691d9652fefc7d4ea5ec8
-
SHA1
17b5b45f1ee33720e2f2af49ad2cc5ab4a00dfa1
-
SHA256
14cd331693da0beb2129e40274f6a0cd34f4287acd8d453e51b8e02a9f3cd6a4
-
SHA512
9aedb8a6c8a173d1cd29ab8084878ff6b3a01c87ab6e6068d0cbad358d3246c5d0b3e9606e88be936dca0228aefa260425ce31e7b045e84bde32eb3cdcab427c
-
SSDEEP
1536:atMpEvqHEIsanj0ly+G0/nE+vBUFrlY9DZKkAMFF71qB3Mb2qEvtebKu1vYfDLEU:atMKH7/tDZv0eBEgbfdYfuwB
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6184373842:AAEi4_K3dZEhdl4S0W6iImdyZ5yqJ6dp-1E/sendMessage?chat_id=5069697890
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
StormKitty payload 1 IoCs
resource yara_rule sample family_stormkitty -
Stormkitty family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1412-63-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
1412-63-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ