General

  • Target

    2760-7-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • Sample

    231011-htg38sag47

  • MD5

    c5e432b001cd79b29ec0372e45f102e1

  • SHA1

    68664435f072e22a36d22c63c2e5da8f0f06c7b4

  • SHA256

    64d02854577baf87983ae93c02077ebf9c5857a90d5590878d21c5b569281697

  • SHA512

    246c95a7f134e0bbaa6624570dee33f65694898682760d411c3f2bb16ef5804dc80a6ee727048da712a055e9a39ac778a0b2b70f6cfa340bef142cd932235123

  • SSDEEP

    1536:Sw1/iDIVFJ9fW0rfMca2t+vBUFMlY6FS9jYZjRwL9QMFkJD8zq5iDPDb/z15g8LO:Sw1/isK8UcaPFSfKk7b715g8LPkwBgZ

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gulfparksuites.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dammam2020

Targets

    • Target

      2760-7-0x0000000000400000-0x0000000000424000-memory.dmp

    • Size

      144KB

    • MD5

      c5e432b001cd79b29ec0372e45f102e1

    • SHA1

      68664435f072e22a36d22c63c2e5da8f0f06c7b4

    • SHA256

      64d02854577baf87983ae93c02077ebf9c5857a90d5590878d21c5b569281697

    • SHA512

      246c95a7f134e0bbaa6624570dee33f65694898682760d411c3f2bb16ef5804dc80a6ee727048da712a055e9a39ac778a0b2b70f6cfa340bef142cd932235123

    • SSDEEP

      1536:Sw1/iDIVFJ9fW0rfMca2t+vBUFMlY6FS9jYZjRwL9QMFkJD8zq5iDPDb/z15g8LO:Sw1/isK8UcaPFSfKk7b715g8LPkwBgZ

    Score
    1/10

MITRE ATT&CK Matrix

Tasks