Behavioral task
behavioral1
Sample
PROOF OF PAYMENT.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PROOF OF PAYMENT.exe
Resource
win10v2004-20231023-en
General
-
Target
PROOF OF PAYMENT.exe
-
Size
142KB
-
MD5
3add120023b59ee143e4385644fb120f
-
SHA1
71f7a289477836ce8789bbb2749e9be4acfaf57f
-
SHA256
f7d51906ee99dd4f0b4f213c716c071e6d3f66be799b77128e8567c7749a1a05
-
SHA512
1216d4be766858798e392b18e58046382e66eaba288b5404e1bae5cd8b558370a58d0d1ff2b6d15dec0bc110bec4da857cf0c612afcf62e2544a06d12a8cc9e5
-
SSDEEP
3072:FhryR6+DP/CUqrEu9fygubH579wBPpxe1guO2z6t2ebY:G+NubZ0pcgY6rb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.pacific.co.za - Port:
587 - Username:
[email protected] - Password:
G@reth#M1tchell - Email To:
[email protected]
Signatures
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource PROOF OF PAYMENT.exe
Files
-
PROOF OF PAYMENT.exe.exe windows:4 windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ