Behavioral task
behavioral1
Sample
2612-13-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2612-13-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
2612-13-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
MD5
4004803c80b9f5b074396609bd76360c
-
SHA1
e6339c0d584df96538d3f1baa78f734498a8b60d
-
SHA256
1d32ab707a7671f97811d8b02feb0b8f227796fea3b42340b9d4229a7d9c9289
-
SHA512
50f63ee4d00fc4150022afa006b49cc5abd14f212de19968d00e603390b5cf8d2f46842b97494d94678b7cbbb7340ce57547da58e66fa1d2d70e78934a099d2e
-
SSDEEP
1536:8OOYzPuJ+iCU2J4nakXr+vBUFMlY6Zn9dCfdGhhLzMFeug3YHLW/7Mb/zRZ4hM0j:8OOYz2L2qnak0ZnRF3YkAb7kP2vwBvP
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6248535023:AAEvCpw2Gs0HsAiSElW_xTdLU8K-oKbc0LU/sendMessage?chat_id=2076143622
Signatures
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2612-13-0x0000000000400000-0x0000000000424000-memory.dmp
Files
-
2612-13-0x0000000000400000-0x0000000000424000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ