General

  • Target

    1292-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    230301-xgsfrshf56

  • MD5

    7e50c60cfc7722d60ca3e5c3ded250c2

  • SHA1

    a4262aa851c917c16a2b49be1c63e5b8a708374a

  • SHA256

    2fa96a52c8c9a36e2a2ee5fa2b736f69e9b67712b0f1ac8da2498ffed8ec2c2c

  • SHA512

    150c95b4e9d77ee3a545f3b756b9045938a86c629d47e07783909a2074477d8fe51393697e65244a374a127c1e98a3d29685e142f373f54aeca254e2163ab6c8

  • SSDEEP

    3072:tJPpyT/d2vu1pmiAR1tMb8z0wBI8iFbY:ZyTV8XbibH8Gb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    rsgraphiteelectrodes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    EA3fDWq3?RQ2

Targets

    • Target

      1292-63-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      7e50c60cfc7722d60ca3e5c3ded250c2

    • SHA1

      a4262aa851c917c16a2b49be1c63e5b8a708374a

    • SHA256

      2fa96a52c8c9a36e2a2ee5fa2b736f69e9b67712b0f1ac8da2498ffed8ec2c2c

    • SHA512

      150c95b4e9d77ee3a545f3b756b9045938a86c629d47e07783909a2074477d8fe51393697e65244a374a127c1e98a3d29685e142f373f54aeca254e2163ab6c8

    • SSDEEP

      3072:tJPpyT/d2vu1pmiAR1tMb8z0wBI8iFbY:ZyTV8XbibH8Gb

    Score
    1/10

MITRE ATT&CK Matrix

Tasks