General

  • Target

    2916-64-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • Sample

    230806-qa2mjaac45

  • MD5

    b8b838b44e39d4062be4ff387d9f33cb

  • SHA1

    5abf15904b3b801506823e5977088bcb73567183

  • SHA256

    d1dfcda2ae3ae5909497cd2dc2ccd97ceb92f53030d11d3aa513bdd4f819bceb

  • SHA512

    88e04cf3a7936e4fbfaa9970606255f0f268456f7d99af39892dc9f36c87c98f23914fbfeaad377a186e438e4b1a9944cd1e64383a65238a2a3460f211433475

  • SSDEEP

    3072:/hTsz1Oj11C8WL30XiAUbxJczxCHkuvtJY/4HsIP/dv6FX:ZTuUtWQXiAUbxJc0HkuvtJRsIP/dCF

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    alibaba.com

Targets

    • Target

      2916-64-0x0000000000400000-0x000000000046A000-memory.dmp

    • Size

      424KB

    • MD5

      b8b838b44e39d4062be4ff387d9f33cb

    • SHA1

      5abf15904b3b801506823e5977088bcb73567183

    • SHA256

      d1dfcda2ae3ae5909497cd2dc2ccd97ceb92f53030d11d3aa513bdd4f819bceb

    • SHA512

      88e04cf3a7936e4fbfaa9970606255f0f268456f7d99af39892dc9f36c87c98f23914fbfeaad377a186e438e4b1a9944cd1e64383a65238a2a3460f211433475

    • SSDEEP

      3072:/hTsz1Oj11C8WL30XiAUbxJczxCHkuvtJY/4HsIP/dv6FX:ZTuUtWQXiAUbxJc0HkuvtJRsIP/dCF

    Score
    1/10

MITRE ATT&CK Matrix

Tasks