Behavioral task
behavioral1
Sample
2676-133-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2676-133-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2676-133-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
454bcb9486e4838dd8705c6373553101
-
SHA1
24a964a47614e60e4a024ad433cd0b75f99f6895
-
SHA256
ed6525a0a58980e291059c0e8241d3383859f9615dc24e3302975f20ced2e046
-
SHA512
8ede3c32ba0eded2a734ac4ee12e556aecb6762aa839052742e06c3e680e27af42450b74b5ebfbe55cec97680714c1e6becea5777e48f3df5879cce5ad1fbb8b
-
SSDEEP
3072:YBGybM97hOQ/iK2jrOyipM/XbKjv01FlAi/sSt8C9wH9YiVF5O+uNXGb8wWGwB2W:HDthOzj8MzKQjbmYiP5OjNXGbdlbXA
Malware Config
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2676-133-0x0000000000400000-0x000000000043A000-memory.dmp
Files
-
2676-133-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE