Behavioral task
behavioral1
Sample
2456-66-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2456-66-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2456-66-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
c393e06a34ed700aade9a3c5636bfc99
-
SHA1
ade34c6e08f64cb2dab8032fd597d595dc065beb
-
SHA256
97d1f90ee159c92865547ccb125cb74ae4d49644f2158af0d88bcc8b31a8f324
-
SHA512
e25580520c196118d1fe52fde21d7a4aa517460c32749249b17b40e300e9a9c64fd1380071f1c7ce91e055def791d804aa068e133b6e6e70882e37f505a217d6
-
SSDEEP
1536:FOOYzPuJEGipAFuDgutB6+sEWE2H8kc4MFM13J3mb/zNJTYkpu3piOWBnTu:FOOYz2CBwggutBM3pmb7Ju5wBnTu
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6076917727:AAGbsf1c44EC0CR26JUQPsvvVqX6Ki5kb9k/sendMessage?chat_id=6282564049
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2456-66-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
2456-66-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ