Behavioral task
behavioral1
Sample
876-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
876-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
876-64-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
b0ede9a66e7eee682403d570de2e3533
-
SHA1
5db02b952a085b644d5fd1c75469a7b9d6a898bc
-
SHA256
2b2bee72bc2631285c77f2056f1161ef6a1b6c3caf0eca3dc10002e2124bfabb
-
SHA512
28f15db70c5c7c6ad3f2900224dd3f9607e2846aa71b40d4dac75058bedc7ceaaaf77f104dfc9361ecf9eb7f6c51ae60ef83c90bfde17f6b3597dd03d098c6d5
-
SSDEEP
3072:WAgAEkoHj/LDdUcAvxsb8cg7wBj2OFbY:LxW+DJsbHZ26b
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5869797424:AAFj7jfdzfUw1CCCNzehFXiYeFWrzxnHnAs/sendMessage?chat_id=1715191138
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 876-64-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
876-64-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ