Behavioral task
behavioral1
Sample
vbc.exe
Resource
win10v2004-20220812-en
General
-
Target
vbc.exe
-
Size
126KB
-
MD5
f188cd4bd817a4ccb603b89bda726505
-
SHA1
eb3443533599cec377693cf14325cc014852cab8
-
SHA256
5d6b1261e0b386aa76ee1d920a2b37962e62257242d8dbc9732c23e29342aa47
-
SHA512
c9f74f7a5c2e93db181c614827ef0993b2f16115b6d52c38ade84445705f12d85a439b779fe87f5e988d5fad6040cd5939b2987f88a9a3d96941bc8e3dec92b2
-
SSDEEP
1536:0mtcOks6s+sSyJrDKfTvXCg59SqX7b/U2GXO/piOWBPhF0Kcl:0mtcXls3dJrDKfTfdOE7b8+wBPhFbY
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5689050416:AAER7vL3U497aoq7pzBRC3Ror1bDYoH5KAQ/sendMessage?chat_id=1736922894
Signatures
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
Files
-
vbc.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ