General

  • Target

    2012-60-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    230602-qe316abh4x

  • MD5

    7bfc71f31fb9fd41af261261b7342d33

  • SHA1

    497a32ee0f4dcbbd6357fb2a120b336c9be92426

  • SHA256

    64101e5d1dbfff919cb9bb6e1e2372b5ce8739ab16ae069262833d98188c6830

  • SHA512

    29eadb6b418ca93b15f019bad40b2d41b9f5ecd8245685235ecf0e441ad2b7c948c66719267e1ab53a63a1e3ecb549793c28c4cf762dbad679e4e4bb0453c132

  • SSDEEP

    1536:hw1/iDIVFFA9rhIxjx0+vBUFrlYYkkkdGqN6gAiy4KMFH6VfciJAMVIb/zjQ7NPM:hw1/isBuIxjSkkZ1JZIb7KoYwwBIV

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    uglyhousebuy.com
  • Port:
    587
  • Username:
    win@uglyhousebuy.com
  • Password:
    ]YSPgjNCuF;W

Targets

    • Target

      2012-60-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      7bfc71f31fb9fd41af261261b7342d33

    • SHA1

      497a32ee0f4dcbbd6357fb2a120b336c9be92426

    • SHA256

      64101e5d1dbfff919cb9bb6e1e2372b5ce8739ab16ae069262833d98188c6830

    • SHA512

      29eadb6b418ca93b15f019bad40b2d41b9f5ecd8245685235ecf0e441ad2b7c948c66719267e1ab53a63a1e3ecb549793c28c4cf762dbad679e4e4bb0453c132

    • SSDEEP

      1536:hw1/iDIVFFA9rhIxjx0+vBUFrlYYkkkdGqN6gAiy4KMFH6VfciJAMVIb/zjQ7NPM:hw1/isBuIxjSkkZ1JZIb7KoYwwBIV

    Score
    1/10

MITRE ATT&CK Matrix

Tasks