General
-
Target
1544-64-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
Sample
220704-jgxhtsheb9
-
MD5
02a09a66bb2b042d03f4c55e9e848478
-
SHA1
100d586cd15809ad7cadf41d1df9cc28f8b37b50
-
SHA256
904dc254c9bd6c13d40a5b8615896e9e2a297a11633bbadd59ba874b0c818a90
-
SHA512
34825e95602f6f816b4ed9f8bd3d9013b5fee632620455bf830ef8828f83dd3df9512edba5f2921cd8cebfa722062771bca8b8b9fce72385ce4edeeebe6d6e4b
Static task
static1
Behavioral task
behavioral1
Sample
1544-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1544-64-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
office.chika@mail.ru - Password:
waQRCNyqaCK7UxnSpzkH - Email To:
office.chika@mail.ru
Targets
-
-
Target
1544-64-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
02a09a66bb2b042d03f4c55e9e848478
-
SHA1
100d586cd15809ad7cadf41d1df9cc28f8b37b50
-
SHA256
904dc254c9bd6c13d40a5b8615896e9e2a297a11633bbadd59ba874b0c818a90
-
SHA512
34825e95602f6f816b4ed9f8bd3d9013b5fee632620455bf830ef8828f83dd3df9512edba5f2921cd8cebfa722062771bca8b8b9fce72385ce4edeeebe6d6e4b
Score1/10 -