Behavioral task
behavioral1
Sample
520-62-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
520-62-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230621-en
General
-
Target
520-62-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
04ad2bb7ec67c7c67a74c86a6f74449a
-
SHA1
0afe9be011d6950ab80f5c42695b00bc9b63724b
-
SHA256
84b2d014b324608f94ea0983316ff8d1c12c593ace62bfe22a9329a8221fc601
-
SHA512
c2c3c181562b50a84bb58fb09a1cc574f399c91eea50c667572f81ce05df0d7b838eebdc6b55447ba84c40d8db3065ff0f953141d93b67894e6453b011d586a3
-
SSDEEP
1536:/PTbARNE4rkNqUd6dU4xi+vBUFrlYYBY7B+GxWgY5S65MFTTp7qiHotb/zxh5GMJ:/PTbINEQdU4ABY/Ib7b5JwB4N
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://posadalaprotegida.com.ar/ - Port:
21 - Username:
[email protected] - Password:
rBmj!U6bgEm8
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 520-62-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
520-62-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ