Behavioral task
behavioral1
Sample
2076-10-0x0000000140000000-0x0000000140022000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2076-10-0x0000000140000000-0x0000000140022000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2076-10-0x0000000140000000-0x0000000140022000-memory.dmp
-
Size
136KB
-
MD5
57f1d9d02640530948827637a43ac1d2
-
SHA1
40a2dafdc115e125d4003f5a8c4dc7e7fb59c795
-
SHA256
6bb94e255efd309f4b3b1db25fa383b463c54000af2ac7944ece2f4cd52fa0d4
-
SHA512
1b2ef1ef8c16975bd79df5404ad04ca1c175597cbe1791a317fc906cb6cb0a4141b2c456b9a191a4838ef2992c1857ca80a7e587762f4ea446911972b4754766
-
SSDEEP
1536:eOOYzPuJQDbmtf49Z4Ig7pwMxIMF8YLCoceIBb/cZwOFBpiOWBT8:eOOYz2Yaq4T7pwMxyUkeIBbUCSzwBT8
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6307848603:AAHuPYbVu9-pOqbv-rh59-MPBtLsLADgIWE/sendMessage?chat_id=6270867455
Signatures
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2076-10-0x0000000140000000-0x0000000140022000-memory.dmp
Files
-
2076-10-0x0000000140000000-0x0000000140022000-memory.dmp.exe windows:4 windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ