Behavioral task
behavioral1
Sample
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp
-
Size
144KB
-
MD5
38ce2ccaaf5f654792068f427d9a16d3
-
SHA1
5fbfaefcbc0f0211a6428cb442245d979f459d01
-
SHA256
d63ecfb4ce224ed9a4862402b65f72d406ea7973ae6cf4857294ab0db2298c88
-
SHA512
678229d3cb74056e114c984a3f2c5caa7cb1a210ee2e1c25e3860ae85b0dba20c58e52eafedff74fc6b6c4108803038b4105696828646d7046353e82c6cf7ef0
-
SSDEEP
3072:k8asEqyUoO1H/IyCvjQEJ0vDbbs2QJsYXwv8YvDbY:jEqyUL1H/XbbyO7b
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
D#Hm!GgJ,?fO;gfR
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp
Files
-
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ