General
-
Target
3028-142-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
Sample
220705-vzearadbg2
-
MD5
28fa7150f8e43520592b453ae491881c
-
SHA1
9a64356c3979ae442936d3e6dc7f1fba26b58f10
-
SHA256
99010e87ba6d87bac4009e10c5addfa69ba3c285f9e763e9edc416cd015c23ce
-
SHA512
43770a6682fcbba73d67e2b555ac85f729a9834af58f5d9cb5be0305bf8724ab0a53d15fb536b95373a8175d568e5ffa582b40bab3c074a0bbfb6b32df5cc4f2
Static task
static1
Behavioral task
behavioral1
Sample
3028-142-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3028-142-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5471298201:AAGFh758keN2eA73SQlIsmB91r4EW74GWCo/sendMessage?chat_id=5144477649
Targets
-
-
Target
3028-142-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
28fa7150f8e43520592b453ae491881c
-
SHA1
9a64356c3979ae442936d3e6dc7f1fba26b58f10
-
SHA256
99010e87ba6d87bac4009e10c5addfa69ba3c285f9e763e9edc416cd015c23ce
-
SHA512
43770a6682fcbba73d67e2b555ac85f729a9834af58f5d9cb5be0305bf8724ab0a53d15fb536b95373a8175d568e5ffa582b40bab3c074a0bbfb6b32df5cc4f2
Score1/10 -