General

  • Target

    740-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    230603-epkf1sfh2w

  • MD5

    70861c2f34d55ae83421610a063b773e

  • SHA1

    e059f413a6bd2c25404b3e63706c697511e6890e

  • SHA256

    227efeea226364dc57e5ee7de6be0fb2616ac0915988746f1b13d480a936dd24

  • SHA512

    00d44d5abb9e5a797e3c59fe962a5fd3477a6ef49e44c5c6faff1f47cda28555d13c7550cda86ca17b66fccd0342b46de12464f0869791fd557db8628c71ca4a

  • SSDEEP

    1536:B5ZMR90Ckj0dhWxnKt++vBUFrlYYoZkR0TFs5RH3OQMF2mu/f4b/zPkmQc3pkpiD:B5ZM8CkQinKsoZ6hIb7cmZOwBBN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sienkakupeste.com
  • Port:
    587
  • Username:
    info@sienkakupeste.com
  • Password:
    010203sienka++
  • Email To:
    saleseuropower2@yandex.com

Targets

    • Target

      740-63-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      70861c2f34d55ae83421610a063b773e

    • SHA1

      e059f413a6bd2c25404b3e63706c697511e6890e

    • SHA256

      227efeea226364dc57e5ee7de6be0fb2616ac0915988746f1b13d480a936dd24

    • SHA512

      00d44d5abb9e5a797e3c59fe962a5fd3477a6ef49e44c5c6faff1f47cda28555d13c7550cda86ca17b66fccd0342b46de12464f0869791fd557db8628c71ca4a

    • SSDEEP

      1536:B5ZMR90Ckj0dhWxnKt++vBUFrlYYoZkR0TFs5RH3OQMF2mu/f4b/zPkmQc3pkpiD:B5ZM8CkQinKsoZ6hIb7cmZOwBBN

    Score
    1/10

MITRE ATT&CK Matrix

Tasks