General

  • Target

    2700-19-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    240430-mv8d2aac97

  • MD5

    5049000ab59496fa98103614ade6b481

  • SHA1

    5849c46c38d0b381b98b1fe6d71ddcead650c2b8

  • SHA256

    7fe942322b55e35ccd698afdf7b80bf04fca29bb45dcb412cd6efc2ec9a35c36

  • SHA512

    d930262d8d52a87ad3247093f42ad0dce9d1c91aaddfcf33949ea9bcd5146da1dd503264a2da6400055cbda8c42f461b5a6c69797cd43f7168684d06f64745a1

  • SSDEEP

    3072:wa9q2DEVYUEcciPL1sfyblxTisQtwvxLo7L5gbY:Q2DEaUEJabM7Lyb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eraslangroup.net
  • Port:
    587
  • Username:
    info@eraslangroup.net
  • Password:
    aHZAyjDK
  • Email To:
    boxdraft80@gmail.com
C2

https://scratchdreams.tk

Targets

    • Target

      2700-19-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      5049000ab59496fa98103614ade6b481

    • SHA1

      5849c46c38d0b381b98b1fe6d71ddcead650c2b8

    • SHA256

      7fe942322b55e35ccd698afdf7b80bf04fca29bb45dcb412cd6efc2ec9a35c36

    • SHA512

      d930262d8d52a87ad3247093f42ad0dce9d1c91aaddfcf33949ea9bcd5146da1dd503264a2da6400055cbda8c42f461b5a6c69797cd43f7168684d06f64745a1

    • SSDEEP

      3072:wa9q2DEVYUEcciPL1sfyblxTisQtwvxLo7L5gbY:Q2DEaUEJabM7Lyb

    Score
    1/10

MITRE ATT&CK Matrix

Tasks