Behavioral task
behavioral1
Sample
04450199.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
04450199.exe
Resource
win10v2004-20230220-en
General
-
Target
04450199.exe
-
Size
126KB
-
MD5
7cd9a2079805e748cd83ecd2ff140fa6
-
SHA1
6d83b9e546a15d0555bf679e355fa3c74c2acc1b
-
SHA256
7b0c02cb66adf1c524768386d28ab90d71ae19ebf80d4be969935be762d0bb22
-
SHA512
6148f165a8c7ecb41d21a21728e1c79687e5e573823d31485aa9b1cbf87bd873c645294ff003569121b5cbc4a64c3e4d9f779f19728d0df9b674358e1f77cb82
-
SSDEEP
1536:ISDrcZc2gUhBw+Q3690+vBUFrlYYwRkRUDFnpBHa2QMFZy7lwDTLyb/cZzjkpiOq:ISDrcW1C036iwRKwDnybUBOwBIbhDbY
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
posta.ni.net.tr - Port:
587 - Username:
[email protected] - Password:
nilya1957 - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04450199.exe
Files
-
04450199.exe.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ