General
-
Target
3060-29-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
Sample
241209-gld6yazpbv
-
MD5
1ce994b004c2bf7422e987f375393bf3
-
SHA1
7274c6c24c5286c5e3135d2426094ea4c1ada2a3
-
SHA256
e9434775c2dfce9e2c856fd8ae1009aef91909a39e919879a6fc0a78cd697e8e
-
SHA512
7af7f88d0b851248ab9a1dd2709eb4c73da6d0c731f73c5d443830da53ea1a3267112d51a73303fa7af5be67ca2f8ab514e4a19b0c52aeedd3b5c441d9ca0ce0
-
SSDEEP
3072:lLIyRktx3CI9jVhNZ5KvRksb5h8m9ywvcGLgbY:DRyxSoKksbbmb
Behavioral task
behavioral1
Sample
3060-29-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3060-29-0x0000000000400000-0x0000000000426000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.ozdenticaret.com.tr - Port:
587 - Username:
[email protected] - Password:
Ozd.135246 - Email To:
[email protected]
Targets
-
-
Target
3060-29-0x0000000000400000-0x0000000000426000-memory.dmp
-
Size
152KB
-
MD5
1ce994b004c2bf7422e987f375393bf3
-
SHA1
7274c6c24c5286c5e3135d2426094ea4c1ada2a3
-
SHA256
e9434775c2dfce9e2c856fd8ae1009aef91909a39e919879a6fc0a78cd697e8e
-
SHA512
7af7f88d0b851248ab9a1dd2709eb4c73da6d0c731f73c5d443830da53ea1a3267112d51a73303fa7af5be67ca2f8ab514e4a19b0c52aeedd3b5c441d9ca0ce0
-
SSDEEP
3072:lLIyRktx3CI9jVhNZ5KvRksb5h8m9ywvcGLgbY:DRyxSoKksbbmb
Score1/10 -