General
-
Target
2432-22-0x0000000140000000-0x0000000140024000-memory.dmp
-
Size
144KB
-
Sample
240409-qya5gsbf8z
-
MD5
0c89ababd8400271398171b670875cab
-
SHA1
392395168de22bf4e8450d2e344fb202021e2a55
-
SHA256
c622d3ee80eebf84092f42e123eab2edd11af811d7149c9f11dcdbcf6edf40c6
-
SHA512
f321d99636e3e3e0e9082b94d9dcaab3f85a218ab5f9c63206ed001252c452707908ca55646d8408e4c51affb486e4a8ffeab93b8e6f3e33c378866da8ebdc2d
-
SSDEEP
3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3:VpmNZMm7Lqbfcb3
Behavioral task
behavioral1
Sample
2432-22-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2432-22-0x0000000140000000-0x0000000140024000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.stpgig.com - Port:
587 - Username:
[email protected] - Password:
Stpgig#Login21
https://scratchdreams.tk
Targets
-
-
Target
2432-22-0x0000000140000000-0x0000000140024000-memory.dmp
-
Size
144KB
-
MD5
0c89ababd8400271398171b670875cab
-
SHA1
392395168de22bf4e8450d2e344fb202021e2a55
-
SHA256
c622d3ee80eebf84092f42e123eab2edd11af811d7149c9f11dcdbcf6edf40c6
-
SHA512
f321d99636e3e3e0e9082b94d9dcaab3f85a218ab5f9c63206ed001252c452707908ca55646d8408e4c51affb486e4a8ffeab93b8e6f3e33c378866da8ebdc2d
-
SSDEEP
3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3:VpmNZMm7Lqbfcb3
Score1/10 -