Behavioral task
behavioral1
Sample
1388-1360-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win10v2004-20250410-en
General
-
Target
1388-1360-0x0000000140000000-0x0000000140024000-memory.dmp
-
Size
144KB
-
MD5
61d7fc56992f6ef25bceb241f00a09ea
-
SHA1
ec26bad785889f726c936dc080384fbc1f3fd781
-
SHA256
1da91192e34e3a227e7b2e3cae4dce99c36fb2f8f1f62a922966937d6ae22f82
-
SHA512
85e4b95fcfcea2912805213867834642343aeaf4fddfdc3ff9faa08cd0e89f2787efd44924bb3f6e795bf037ecbd98772f5e841bb37aab9ecdfaac5ccbda838f
-
SSDEEP
3072:zVJg2V2QyG3YZvp3UFbcrwxt5RMVbqwE5K1Kbv4XysDor2vrkp72qbt2i+mWowv5:I2V2QyG3YZvpUFbcrwxt5RMVbqwE5K14
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7016021549:AAFFED6mrzzYMktPd78AMWdi_nAN7SC1JJY/sendMessage?chat_id=1018401531
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1388-1360-0x0000000140000000-0x0000000140024000-memory.dmp
Files
-
1388-1360-0x0000000140000000-0x0000000140024000-memory.dmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ