Behavioral task
behavioral1
Sample
2656-62-0x0000000000710000-0x0000000000736000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2656-62-0x0000000000710000-0x0000000000736000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2656-62-0x0000000000710000-0x0000000000736000-memory.dmp
-
Size
152KB
-
MD5
c9c19a37e4d75e52bf415c133f546fc2
-
SHA1
251b410fc802b8378bc9a9b2df6c2ce0d63c20df
-
SHA256
d960a12a13f566bc978e93bcb44d10c6345ce505487f55b8291d635cefee2c84
-
SHA512
4a2bd3ff096518e4a418004d72d5eb27ca0e108270ddabf48598a7422368795512aa4931b57558cb2ed5fe45a4fc86024ce41778e9c2833e29962f47459ffd55
-
SSDEEP
3072:ffDDt3rX3NVk7vJr2b7jq7UTmwB8V4gbY:vt7aRabydVBb
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://brdm.cloud/ - Port:
21 - Username:
[email protected] - Password:
!Awk{o$88]JW
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2656-62-0x0000000000710000-0x0000000000736000-memory.dmp
Files
-
2656-62-0x0000000000710000-0x0000000000736000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ