Behavioral task
behavioral1
Sample
2200-12-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2200-12-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2200-12-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
e2bde246faadb740e8c38c99a3f75cc1
-
SHA1
f79875fe78ec4a8d2cc326f47e07fab647502b2c
-
SHA256
f2197c6061f390c8b3f1d9985f28097cb22463f565daf9f0e90be8f170b262f3
-
SHA512
82234fec3a05ab50fe7cddbc6d2eaaa0d1f9a44ee20fde0c20ce96ceded2857a7580a10a6fbd3c7065662d6f7fe37e2911974460fae5c93030a2f651b8d140cd
-
SSDEEP
3072:Uy4vdnls38SN7jaAldy9Jb5gSlqmWYwvcXmXgbY:IdlslynbCSMQb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.emmioglu.com - Port:
587 - Username:
[email protected] - Password:
Kaya2758+
https://api.telegram.org/bot7601416878:AAHzH1jwUm0RRKH14oQQySe6mjhxYuRjdzQ/sendMessage?chat_id=6605246356
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2200-12-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
2200-12-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ