General

  • Target

    2776-26-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • Sample

    231002-t7p7jsee88

  • MD5

    998250d06a182a4875b746507b289e5a

  • SHA1

    40be469d835f9ea95bf25f7268ff3cee91853d67

  • SHA256

    46c058579ded5489705683c685f9b84edcc11002d70183bf64af34032d6a098e

  • SHA512

    1fe9b5070f4943ea23fe7a58c5d19d301204836993b7102c2e03452ff5ec03c0db8d3c2c28c4170d632732e926525f5b7e8ed86658d4e96ccc6bd11eacc65c89

  • SSDEEP

    1536:6w1/iDIVFJ9fW09BIkBG7LoBHojPJuTMFq16wb/zg3oPzma/piOWBkx+g0Kcl:6w1/isKYBIkBGiywb7FPjRwBkx+gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gkas.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gkasteknik@2022

Targets

    • Target

      2776-26-0x0000000000400000-0x0000000000424000-memory.dmp

    • Size

      144KB

    • MD5

      998250d06a182a4875b746507b289e5a

    • SHA1

      40be469d835f9ea95bf25f7268ff3cee91853d67

    • SHA256

      46c058579ded5489705683c685f9b84edcc11002d70183bf64af34032d6a098e

    • SHA512

      1fe9b5070f4943ea23fe7a58c5d19d301204836993b7102c2e03452ff5ec03c0db8d3c2c28c4170d632732e926525f5b7e8ed86658d4e96ccc6bd11eacc65c89

    • SSDEEP

      1536:6w1/iDIVFJ9fW09BIkBG7LoBHojPJuTMFq16wb/zg3oPzma/piOWBkx+g0Kcl:6w1/isKYBIkBGiywb7FPjRwBkx+gbY

    Score
    1/10

MITRE ATT&CK Matrix

Tasks