General

  • Target

    2464-22-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • Sample

    231011-hsr7tage9w

  • MD5

    faa55431d1d6585c0059e4c7265e3960

  • SHA1

    18cffcd81a80b8868b8cc88288070f37b8fc917b

  • SHA256

    3c6853dcb899d1bacf4233f2e550ca6d5e9705d03e86e20b24a48ab7c0b57f8d

  • SHA512

    772a523347eef8119ac47767d2e3ce2db4c2ef9da68bb5ff72ee3723e4d2c366f87aecd88e66ce3f19c0ca4dc4bd6dece71dbea3b2341a75569b1d39e15eff6e

  • SSDEEP

    1536:z8QFoRxLeX2uiiGvh0ePplH+B/qpjWrLVcMFWeipsG248bVkzYMZfpiOWB3n9g0d:AQFoPLPzKePplH+itibVexwB3n9gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.1tcl.com
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    RRa*ysS8

Targets

    • Target

      2464-22-0x0000000000400000-0x0000000000424000-memory.dmp

    • Size

      144KB

    • MD5

      faa55431d1d6585c0059e4c7265e3960

    • SHA1

      18cffcd81a80b8868b8cc88288070f37b8fc917b

    • SHA256

      3c6853dcb899d1bacf4233f2e550ca6d5e9705d03e86e20b24a48ab7c0b57f8d

    • SHA512

      772a523347eef8119ac47767d2e3ce2db4c2ef9da68bb5ff72ee3723e4d2c366f87aecd88e66ce3f19c0ca4dc4bd6dece71dbea3b2341a75569b1d39e15eff6e

    • SSDEEP

      1536:z8QFoRxLeX2uiiGvh0ePplH+B/qpjWrLVcMFWeipsG248bVkzYMZfpiOWB3n9g0d:AQFoPLPzKePplH+itibVexwB3n9gbY

    Score
    1/10

MITRE ATT&CK Matrix

Tasks