Behavioral task
behavioral1
Sample
3856-1090-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3856-1090-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3856-1090-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
MD5
ce5ecec8d135397ef9407ce09fce172a
-
SHA1
d0da55d485dc5f61252884fec1dad2db116007bf
-
SHA256
d45bbbb0d0dfb6398059c4e802a2e46e169eeee6e13bbc7561da05509e7b39bb
-
SHA512
8249897071fc1d72e69f8c1559c88e2df3c3db7b860fc7654f25b8f7743e78e657eb53fbe9a61d796d356f3aa0881b77ec1b7170b08e385e33f0b211df38ef6b
-
SSDEEP
3072:EOOYz2sMJZjJ3EJbeIb7HyUywBvP0gbY:9z5ZbrhP1b
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6311663777:AAE8NP53YXoDAfpfM7Ut2zGG4pncQ742mHI/sendMessage?chat_id=1467583453
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3856-1090-0x0000000000400000-0x0000000000424000-memory.dmp
Files
-
3856-1090-0x0000000000400000-0x0000000000424000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ