General
-
Target
2688-3-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
Sample
241003-hqwgfstfra
-
MD5
d36d742062011f6761843f07ec11a699
-
SHA1
75085a10121ee0f035d34cbf5113a4fbd681569a
-
SHA256
9fe2b6e78c6281cad91e2c09deb15d5d7efb9720cc4ad4e213b525b46d2be285
-
SHA512
51cfed7a4f7b2700e9dc0fbf788c18b21ac75bf07d0b00df648fe4dc782fc7d61ebe03c0db8439e0fd432b9946a6a8f88a64ffc422e9f141c0cf38f862ba9553
-
SSDEEP
3072:ANMXf17IpQAyapE1b5HJjz4sLcwvxd7gbY:3f18kbrtMb
Behavioral task
behavioral1
Sample
2688-3-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2688-3-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.kotobagroup.com - Port:
587 - Username:
[email protected] - Password:
Kotoba@2022!
Targets
-
-
Target
2688-3-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
d36d742062011f6761843f07ec11a699
-
SHA1
75085a10121ee0f035d34cbf5113a4fbd681569a
-
SHA256
9fe2b6e78c6281cad91e2c09deb15d5d7efb9720cc4ad4e213b525b46d2be285
-
SHA512
51cfed7a4f7b2700e9dc0fbf788c18b21ac75bf07d0b00df648fe4dc782fc7d61ebe03c0db8439e0fd432b9946a6a8f88a64ffc422e9f141c0cf38f862ba9553
-
SSDEEP
3072:ANMXf17IpQAyapE1b5HJjz4sLcwvxd7gbY:3f18kbrtMb
Score1/10 -