General

  • Target

    2660-10-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • Sample

    231111-z52epabf4v

  • MD5

    8795083835cdb4acd39122737700c4a7

  • SHA1

    c54efc6dd3d9e470aa1cea5a9c334ed001a4e438

  • SHA256

    4dbe2664aa5d662d6e5ada04f983b442983220db0b4c708ca5367d8c4f143ff3

  • SHA512

    5a4446b430f9b341a860622cda81f1a01f9297ba28c2a2b6eebd83439c3d530b63d537455fc95caf9b492caa329b5565a717c05d6997215830e63a242cbe5c05

  • SSDEEP

    3072:Qhbs8dCWJ1RUEqJkZjXh++CHkuv5GGJG14X9SsQ4HsSX7L16FX:6bPJ+EqJUh4Hkuv5GGJGO1XsSX7LkF

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    BkKMmzZ1

Targets

    • Target

      2660-10-0x0000000000400000-0x000000000046A000-memory.dmp

    • Size

      424KB

    • MD5

      8795083835cdb4acd39122737700c4a7

    • SHA1

      c54efc6dd3d9e470aa1cea5a9c334ed001a4e438

    • SHA256

      4dbe2664aa5d662d6e5ada04f983b442983220db0b4c708ca5367d8c4f143ff3

    • SHA512

      5a4446b430f9b341a860622cda81f1a01f9297ba28c2a2b6eebd83439c3d530b63d537455fc95caf9b492caa329b5565a717c05d6997215830e63a242cbe5c05

    • SSDEEP

      3072:Qhbs8dCWJ1RUEqJkZjXh++CHkuv5GGJG14X9SsQ4HsSX7L16FX:6bPJ+EqJUh4Hkuv5GGJGO1XsSX7LkF

    Score
    1/10

MITRE ATT&CK Matrix

Tasks