General

  • Target

    3500-17-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    240515-pvbfeahg4s

  • MD5

    8dd067f3e5c9aa7f7a8e56da48b76261

  • SHA1

    785455e3add4600b0435ccb2f8a7c67134d96e13

  • SHA256

    369704d1e0a3181522767d18ae831a79fe1bf0a06bec228ae238b2b436015bbd

  • SHA512

    8621d2d6588438ab944f2cd405a1d6f690f815a781f412ac466d16d96747203d57c4efde73e3aaf253e734676955d64048300a2d0baf66f22078b21e14e54ba2

  • SSDEEP

    3072:ygV4tM/zKl/jC0SgW6KCyVtjblgEsXSwv8Ls7LxgbY:qtM/ul/FVyVZb27LKb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gbogboro.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Egoamaka@123
C2

https://scratchdreams.tk

Targets

    • Target

      3500-17-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      8dd067f3e5c9aa7f7a8e56da48b76261

    • SHA1

      785455e3add4600b0435ccb2f8a7c67134d96e13

    • SHA256

      369704d1e0a3181522767d18ae831a79fe1bf0a06bec228ae238b2b436015bbd

    • SHA512

      8621d2d6588438ab944f2cd405a1d6f690f815a781f412ac466d16d96747203d57c4efde73e3aaf253e734676955d64048300a2d0baf66f22078b21e14e54ba2

    • SSDEEP

      3072:ygV4tM/zKl/jC0SgW6KCyVtjblgEsXSwv8Ls7LxgbY:qtM/ul/FVyVZb27LKb

    Score
    1/10

MITRE ATT&CK Matrix

Tasks