General

  • Target

    1316-15-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • Sample

    240624-hgl7eszapf

  • MD5

    a0ded9cc1bf2fb5363ea248f2afcd2db

  • SHA1

    dcfeb3747a75b46db6d62cfda38b9fe6d0316406

  • SHA256

    f1c7ffd484ba4cb243c33e61285d734d344742d130c5082cbbdc7a664c5abfe5

  • SHA512

    4055c4610ac6ff65b08ca3e896a1c6008d7fe919ad4bb8cc24b149c26559b74227050db6efe4f0724fef45c239fe50300b8f35d142d90d28ea3e172096e08048

  • SSDEEP

    3072:oItxksC4RHxdXK1rMA13SjXaToxZ6b0swmzHsr1wvxLx0ugbY:FksCMHx9KdCyo76bvwmf0Pb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    fY,FLoadtsiF
C2

http://103.130.147.85

Targets

    • Target

      1316-15-0x0000000000400000-0x0000000000426000-memory.dmp

    • Size

      152KB

    • MD5

      a0ded9cc1bf2fb5363ea248f2afcd2db

    • SHA1

      dcfeb3747a75b46db6d62cfda38b9fe6d0316406

    • SHA256

      f1c7ffd484ba4cb243c33e61285d734d344742d130c5082cbbdc7a664c5abfe5

    • SHA512

      4055c4610ac6ff65b08ca3e896a1c6008d7fe919ad4bb8cc24b149c26559b74227050db6efe4f0724fef45c239fe50300b8f35d142d90d28ea3e172096e08048

    • SSDEEP

      3072:oItxksC4RHxdXK1rMA13SjXaToxZ6b0swmzHsr1wvxLx0ugbY:FksCMHx9KdCyo76bvwmf0Pb

    Score
    1/10

MITRE ATT&CK Matrix

Tasks