General
-
Target
2060-10-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
Sample
231113-kllgssbf3s
-
MD5
8f9371614d5fe48e23bbc8478e444751
-
SHA1
22b43c32cf1d7d7d8aac49bc3c488f3dfff35e53
-
SHA256
ab894ca6bea0e8cc5c4fc65f2a65a43ff94939f31231f9296e6229fa16e6c5c9
-
SHA512
bf3ebad781a8a04eaad68d88723936b34f2b19d7eedb5edae642139539ea8c97110f6c0a78c00272fbdbe3f0916227b5c85d7e04584d3ac51a0335c558481537
-
SSDEEP
1536:1R2lYen2RwKeRWJF8Atp+vBUFMlY6OgkKwBmsb+o16MFigB1b/zu2C/mKRJpiOW2:72lYlqsF8A8OgMz1b71qLwBgnvgbY
Behavioral task
behavioral1
Sample
2060-10-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2060-10-0x0000000000400000-0x0000000000424000-memory.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.status-automation.com - Port:
587 - Username:
[email protected] - Password:
bkkhoostatus2018 - Email To:
[email protected]
Targets
-
-
Target
2060-10-0x0000000000400000-0x0000000000424000-memory.dmp
-
Size
144KB
-
MD5
8f9371614d5fe48e23bbc8478e444751
-
SHA1
22b43c32cf1d7d7d8aac49bc3c488f3dfff35e53
-
SHA256
ab894ca6bea0e8cc5c4fc65f2a65a43ff94939f31231f9296e6229fa16e6c5c9
-
SHA512
bf3ebad781a8a04eaad68d88723936b34f2b19d7eedb5edae642139539ea8c97110f6c0a78c00272fbdbe3f0916227b5c85d7e04584d3ac51a0335c558481537
-
SSDEEP
1536:1R2lYen2RwKeRWJF8Atp+vBUFMlY6OgkKwBmsb+o16MFigB1b/zu2C/mKRJpiOW2:72lYlqsF8A8OgMz1b71qLwBgnvgbY
Score1/10 -