Behavioral task
behavioral1
Sample
2320-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2320-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2320-64-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
576ea88a2af41f842bed369ae454cf1c
-
SHA1
e4647840bd43016c41e906ef3f09961d85fd2d24
-
SHA256
7179a9044874b3950a3f85dba192d9735aa46ee70d62f403b6467fde50f5eafc
-
SHA512
d23a7bae5174aa9fabea507a52b69edd3ef75de8535e5b67d85790870a5f2a94dcd03278cbc5f842b7167ab2c2e9ada489df81fd996aaa1fef01ff06ae29e895
-
SSDEEP
1536:zPdT62gHBkCq6PZH9rDNMF9OPLKqp3xghwP+Eb/z9HxtpCAE16piOWB8N:zPdTdEqF6PZH9RBghyb7lpCAE1swB8N
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
198.23.221.13 - Port:
2525 - Username:
[email protected] - Password:
admin1
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2320-64-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
2320-64-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ