Behavioral task
behavioral1
Sample
548-76-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
548-76-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
548-76-0x0000000140000000-0x0000000140024000-memory.dmp
-
Size
144KB
-
MD5
9668167d8c1f29caf00eb9872acf0adf
-
SHA1
2d733dd97770cd166c0f519394f44e1c41253dcd
-
SHA256
1c01bb41f1857342fed697149a0236c551f6b78b2b6bbe99624c5aefb5b7215f
-
SHA512
0bca93ad66533567274af2458b93c8fcdabf3a204ec0391cdc18c1555d9a3cc7859e7c88b5e88c26ab6296cd94349e3b54e7e462e2f45f3cf3f9d70f83c2c06c
-
SSDEEP
1536:xjdKxVAyl0ga6hnnTYm7++vBUFrlYY0k7rhybNbmJ11nMFQOP73jC9m9i1Bb/cjE:xjdK8uHa65YmC0kjyTXw1BbU9dwBFb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.kattanqroup.com - Port:
587 - Username:
[email protected] - Password:
@QOZ@qs4
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 548-76-0x0000000140000000-0x0000000140024000-memory.dmp
Files
-
548-76-0x0000000140000000-0x0000000140024000-memory.dmp.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ