Behavioral task
behavioral1
Sample
2116-4928-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2116-4928-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240611-en
General
-
Target
2116-4928-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
5375df67305673b8afa74034ce7f7abb
-
SHA1
ae546fdc52afd5577d4ef89b268066feb4ec320f
-
SHA256
700cdca71d497f1237c2e1c1ba2b9447c531f20374350543308cd52710f4b689
-
SHA512
6a4063b406d225b3334aa5d31fa6da746edf79e38e5da352361b4b145cf7848be4f4427acf1c04604699cf2b0cea9f4fcec433bd26681ba9fbba9012e5ce5fbd
-
SSDEEP
3072:CaCXEhpmr4x6QcGnjPvYor21w34DNbadmWUwvEXXmPgbY:cEhp44x6Qc3DNbjmob
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://files.000webhost.com/ - Port:
21 - Username:
uzo1919 - Password:
Computer@101
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2116-4928-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
2116-4928-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ