General
-
Target
2656-15-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
Sample
240508-jmaagsaa4w
-
MD5
95646159a57d497c49d1f6257258a5ed
-
SHA1
d66fb7499f6ad7e68452142c6d9fe8526706fad0
-
SHA256
3a7282fd6b5687972a1c2541f91cb19a06e9bfaa5a74f8c5aaa2cb037e21c1dc
-
SHA512
6cd2f4ab14555efa7f9ab35227b2c9c0cdb0b98cb201768d477b55058fb81670358b3f2a619b30a30d56eb66e6a23e2fd1179aafb7f3b194769cd17a976e473e
-
SSDEEP
3072:c6DN+tgiYQPdQ1IbQI4Q9tsQ1fvxL4UNZgbY:ZH8cIbdAUUb
Behavioral task
behavioral1
Sample
2656-15-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2656-15-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.lubentech.com - Port:
587 - Username:
[email protected] - Password:
hamid@1349 - Email To:
[email protected]
https://scratchdreams.tk
Targets
-
-
Target
2656-15-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
95646159a57d497c49d1f6257258a5ed
-
SHA1
d66fb7499f6ad7e68452142c6d9fe8526706fad0
-
SHA256
3a7282fd6b5687972a1c2541f91cb19a06e9bfaa5a74f8c5aaa2cb037e21c1dc
-
SHA512
6cd2f4ab14555efa7f9ab35227b2c9c0cdb0b98cb201768d477b55058fb81670358b3f2a619b30a30d56eb66e6a23e2fd1179aafb7f3b194769cd17a976e473e
-
SSDEEP
3072:c6DN+tgiYQPdQ1IbQI4Q9tsQ1fvxL4UNZgbY:ZH8cIbdAUUb
Score1/10 -