Behavioral task
behavioral1
Sample
2688-3-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2688-3-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2688-3-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
d36d742062011f6761843f07ec11a699
-
SHA1
75085a10121ee0f035d34cbf5113a4fbd681569a
-
SHA256
9fe2b6e78c6281cad91e2c09deb15d5d7efb9720cc4ad4e213b525b46d2be285
-
SHA512
51cfed7a4f7b2700e9dc0fbf788c18b21ac75bf07d0b00df648fe4dc782fc7d61ebe03c0db8439e0fd432b9946a6a8f88a64ffc422e9f141c0cf38f862ba9553
-
SSDEEP
3072:ANMXf17IpQAyapE1b5HJjz4sLcwvxd7gbY:3f18kbrtMb
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.kotobagroup.com - Port:
587 - Username:
[email protected] - Password:
Kotoba@2022!
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2688-3-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
2688-3-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ