General

  • Target

    3656-4-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    241111-vt5krascrj

  • MD5

    22ef3490dbfa8059210882bb32f1aca3

  • SHA1

    3fbeca147750ebe39356bac3718905f55bf694b7

  • SHA256

    e34cf8e9262e6b04d189ae4d0a62110d4beb771743294fb495878ffd87420084

  • SHA512

    ba25341921035f849b708c068bfab783443b8185f228672fefbe9fcb27c0ed57a0d61381e9ca09045efed571d36fccb8a0357f9a574a5c2630b0f41713ef200f

  • SSDEEP

    3072:VFsv+OeQnkg1ZGBEZKVwMb0b5WWNsL/wvxXbgbY:gRlnUNio0b7fsb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bellstone.in
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    N % m 22 , . , .2 0 2 10 3

Targets

    • Target

      3656-4-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      22ef3490dbfa8059210882bb32f1aca3

    • SHA1

      3fbeca147750ebe39356bac3718905f55bf694b7

    • SHA256

      e34cf8e9262e6b04d189ae4d0a62110d4beb771743294fb495878ffd87420084

    • SHA512

      ba25341921035f849b708c068bfab783443b8185f228672fefbe9fcb27c0ed57a0d61381e9ca09045efed571d36fccb8a0357f9a574a5c2630b0f41713ef200f

    • SSDEEP

      3072:VFsv+OeQnkg1ZGBEZKVwMb0b5WWNsL/wvxXbgbY:gRlnUNio0b7fsb

    Score
    1/10

MITRE ATT&CK Matrix

Tasks