General

  • Target

    684-137-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    22472317bd921e4c43bf12d6ac3e28ff

  • SHA1

    d9bc2e73290d8e2e87aea142de53f93eaa4ee701

  • SHA256

    e7faa7aa9f76a3d029f999447ff712e4e719c69bbb0cb445ac9e8aa4088c671f

  • SHA512

    0dc417cd0125abdca589d9ae72e0e3cd109080712e1c52d0971bc49a8910630d22449053a57f74bb2da0099e17df96b89d1180978a96e60cd28d8b019ffc0210

  • SSDEEP

    6144:ktBKqVNE3j73DSuYii6NTb5Hijz9y/2EbAVfOjU0nXgXLZF1uUpBHlK+XOOqz5Nm:kR3E3HDei3oXA2jCXgXLz/HQOqzjW/N

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.putlock.co.uk
  • Port:
    587
  • Username:
    garry@putlock.co.uk
  • Password:
    Puttflue94
  • Email To:
    jantonio.crystal.cfi@gmail.com
C2

https://api.telegram.org/bot5502458727:AAFTUrq_Mr-3cF-XZNdwaOsYHT_Ur2vcW3E/sendMessage?chat_id=1530075292

Signatures

  • Snake Keylogger Payload 1 IoCs
  • Snakekeylogger family

Files

  • 684-137-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections