General

  • Target

    2160-12-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • Sample

    231025-t4cgaach5s

  • MD5

    f1034a688e446dfc414826c31867fb79

  • SHA1

    369f5d5f5b9da46db9d9b10db730c8fc2efdb9f7

  • SHA256

    2229860441096651219c7f86bbb28c91c88a3db6aeb5a9f0e0a081c74876610e

  • SHA512

    7ebaafe8a0e8f523d26a15082ca1a92939e9968aa93823bcfe08238a4c7a9fdae94c6ec8449d445a5cfbafc9e5c505bbc0c21ffb4f43c44aed4b4635b79033ca

  • SSDEEP

    3072:GP0sP2pBUx/aOAB/vA3ikQjflncQ/ricIvmp64Hi8fvN16FX:dsdUdBA3ikQjtncQjicIvmHi8fvNkF

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.agrosanteknik.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    E9W#tLsHT2z+

Targets

    • Target

      2160-12-0x0000000000400000-0x000000000046A000-memory.dmp

    • Size

      424KB

    • MD5

      f1034a688e446dfc414826c31867fb79

    • SHA1

      369f5d5f5b9da46db9d9b10db730c8fc2efdb9f7

    • SHA256

      2229860441096651219c7f86bbb28c91c88a3db6aeb5a9f0e0a081c74876610e

    • SHA512

      7ebaafe8a0e8f523d26a15082ca1a92939e9968aa93823bcfe08238a4c7a9fdae94c6ec8449d445a5cfbafc9e5c505bbc0c21ffb4f43c44aed4b4635b79033ca

    • SSDEEP

      3072:GP0sP2pBUx/aOAB/vA3ikQjflncQ/ricIvmp64Hi8fvN16FX:dsdUdBA3ikQjtncQjicIvmHi8fvNkF

    Score
    1/10

MITRE ATT&CK Matrix

Tasks