Behavioral task
behavioral1
Sample
3052-25-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3052-25-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3052-25-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
4aa2b28e96fbb0b215ddd4fe2831d0ec
-
SHA1
3ffeed252590717a5e19c39c25651a97c1faaddb
-
SHA256
d3addc8ba162c736715ea9d4c6c0b35db5b13d26da67dd2c1f2adfdb1d982a64
-
SHA512
4047f66f6b1a8abc31392e9f673c1eda6837a94592418305a4d3beeba85dae285be03bafa37bfaeca633b43691b016b4c91d6447463611d5a2a775da27bb0f78
-
SSDEEP
3072:w99yINAgKjV545jbvk5Hbe7fMuJN07T+tVeGm06fTQ2sG8Bb5C5mWTwvcXyfgbY:jINAgKjV5Cjbvk5Hbe7fMuJN07TuObu+
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA/sendMessage?chat_id=6939220311
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3052-25-0x0000000000400000-0x0000000000426000-memory.dmp
Files
-
3052-25-0x0000000000400000-0x0000000000426000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ