Behavioral task
behavioral1
Sample
3880-1220-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3880-1220-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3880-1220-0x0000000140000000-0x0000000140024000-memory.dmp
-
Size
144KB
-
MD5
b8462bdcc913124daab079c71575279b
-
SHA1
c2fb948e5b71d05d0b1adcad8b555348158ab0b6
-
SHA256
5da282fef9071d8f672624dd51a7dfedda5021b54c8cd42ba7b25f2f3d7c18e2
-
SHA512
a5aa4f6e32ce4e3a8dc078b0081aee1bf5c334bf2788f632111e9a352a4446367687dcfade960bda8ef1235196cf54b22e6f89ed2e626687dcc213ceb9cab8ad
-
SSDEEP
1536:qOOYzPuJ/ahpnPIdS4S+vBUFrlYY6b7xj/gTVonjvLMF4FXZBFpRb/cHQPE5ODFl:qOOYz2l2PIdSd6bXjbUhK47wBjRIDbY
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6234651025:AAFjbt6iZ1vTAi98WikYTmxJFGRMPTZ_0rI/sendMessage?chat_id=5000869361
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3880-1220-0x0000000140000000-0x0000000140024000-memory.dmp
Files
-
3880-1220-0x0000000140000000-0x0000000140024000-memory.dmp.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ