Behavioral task
behavioral1
Sample
644-66-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
644-66-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
644-66-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
1b933cc3e271ac27d02f7ed1ad2f3df8
-
SHA1
2499eeb34b3487f7ba4f8e06bb76d9b27d3d06c1
-
SHA256
5108a132336080d20d163c9e0c7ee01548685f31cf44bdeb7e354202524cb3c6
-
SHA512
ad178ebab293ed13c37e0b7d659b53a054cbd3b5bcfa0503b86a9e9fdc7a2afd7ef78b79822d21f568d3c151d7d9374ae1f4b6381b9f726388ebf7db3dabc788
-
SSDEEP
3072:yOOYz28fkhDyYdS348jb7P5icDwBOT9gbY:zz/9YkIAbb5iETeb
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5977159085:AAGkppBaRI1C-uOkQ7XsAFcaTUm_2GPrYFM/sendMessage?chat_id=6082978649
Signatures
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 644-66-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
644-66-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ