General

  • Target

    268-24-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • Sample

    231002-t7e2kscg8t

  • MD5

    a62e280d0876d303a7ef9168e6263e3a

  • SHA1

    05a06f2a0c5a80575992a37fa035669c94c06af2

  • SHA256

    cdbf21c5a178b0e11b4a3f5d40b01c0587185f5e19250e8e1b9648630ece4066

  • SHA512

    809a9f023914ba5ce24ffd4255ef3d3cf401814129f9194a3e1af576e520230fcd1836f0e96a9841b9c991b15bfed9d70cb264580205b7ae546e3ee283903066

  • SSDEEP

    1536:Mw1/iDIVFJ9fW09BIkBG7LoBHojPJuTMFq16wb/zg3oPzma/piOWBkx+g0Kcl:Mw1/isKYBIkBGiywb7FPjRwBkx+gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gkas.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gkasteknik@2022

Targets

    • Target

      268-24-0x0000000000400000-0x0000000000424000-memory.dmp

    • Size

      144KB

    • MD5

      a62e280d0876d303a7ef9168e6263e3a

    • SHA1

      05a06f2a0c5a80575992a37fa035669c94c06af2

    • SHA256

      cdbf21c5a178b0e11b4a3f5d40b01c0587185f5e19250e8e1b9648630ece4066

    • SHA512

      809a9f023914ba5ce24ffd4255ef3d3cf401814129f9194a3e1af576e520230fcd1836f0e96a9841b9c991b15bfed9d70cb264580205b7ae546e3ee283903066

    • SSDEEP

      1536:Mw1/iDIVFJ9fW09BIkBG7LoBHojPJuTMFq16wb/zg3oPzma/piOWBkx+g0Kcl:Mw1/isKYBIkBGiywb7FPjRwBkx+gbY

    Score
    1/10

MITRE ATT&CK Matrix

Tasks