General
-
Target
2804-8-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
Sample
240424-j7eeyaga52
-
MD5
e6a2074a4eb13ea9b89d9a6d17cb8dc4
-
SHA1
9c674a8705885bffb4592512c74e2d1fae4a8305
-
SHA256
43aff636ea577816eb86c3a792746cf03f089f34fb5494666f702bd89cdddb4f
-
SHA512
6e3f5ede8f061096142ac5b758d1de4ba03657c22a63f00ba3f541e9a714764ae8fe04481c2124a8fb4bb783618fba5502a4cc5328660ca7e78f724448570042
-
SSDEEP
3072:Wa9q2DEVYUEcciPL1sfJd2URObliCInosQlwvxLo7L:a2DEaUEJivbW67L
Behavioral task
behavioral1
Sample
2804-8-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2804-8-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.agmfilter.com - Port:
587 - Username:
[email protected] - Password:
sibelr_63017 - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
2804-8-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
e6a2074a4eb13ea9b89d9a6d17cb8dc4
-
SHA1
9c674a8705885bffb4592512c74e2d1fae4a8305
-
SHA256
43aff636ea577816eb86c3a792746cf03f089f34fb5494666f702bd89cdddb4f
-
SHA512
6e3f5ede8f061096142ac5b758d1de4ba03657c22a63f00ba3f541e9a714764ae8fe04481c2124a8fb4bb783618fba5502a4cc5328660ca7e78f724448570042
-
SSDEEP
3072:Wa9q2DEVYUEcciPL1sfJd2URObliCInosQlwvxLo7L:a2DEaUEJivbW67L
Score1/10 -