General
-
Target
2412-13-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
Sample
231106-qbz54abc5v
-
MD5
438d379109656a1b064edefce732bc12
-
SHA1
7436c58c70048742065adbd8ccd0e630a6698f3f
-
SHA256
2ecbb7786c08bbae24869eb7ed8923b3b0ee2624bcc9f1d54a18926fd149f11f
-
SHA512
cdda27e902fdbaa611a876fc1386190e4121bcf15bb395466d5015541c0401e591c83a65bc57c339972a30f937a961c18eac6ea650f525106c3500e7b8491ac3
-
SSDEEP
1536:sgTDUM1qcKF2pBNSECX8U/61uyQ9IIeaMFXnaK+CKJRSyWibVgJsb1dtbYpiOWBS:sgTD1XhSNX8U/kaKlcSKbV7xjawBUn
Behavioral task
behavioral1
Sample
2412-13-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2412-13-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.mct2.co.za - Port:
587 - Username:
[email protected] - Password:
00000
Targets
-
-
Target
2412-13-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
MD5
438d379109656a1b064edefce732bc12
-
SHA1
7436c58c70048742065adbd8ccd0e630a6698f3f
-
SHA256
2ecbb7786c08bbae24869eb7ed8923b3b0ee2624bcc9f1d54a18926fd149f11f
-
SHA512
cdda27e902fdbaa611a876fc1386190e4121bcf15bb395466d5015541c0401e591c83a65bc57c339972a30f937a961c18eac6ea650f525106c3500e7b8491ac3
-
SSDEEP
1536:sgTDUM1qcKF2pBNSECX8U/61uyQ9IIeaMFXnaK+CKJRSyWibVgJsb1dtbYpiOWBS:sgTD1XhSNX8U/kaKlcSKbV7xjawBUn
Score1/10 -