General

  • Target

    2028-67-0x0000000000200000-0x0000000000226000-memory.dmp

  • Size

    152KB

  • MD5

    0cbfeedf98c2be8f26ca15142b2f0d9c

  • SHA1

    a7b3ae5cba34c05b88da0cb5aca93279a2b2398c

  • SHA256

    732fd9fe6f0336da24e8e690732f118702ca88b3d004c357769ccca5853932de

  • SHA512

    de7d867bdb41d38e18879e8247d2a5fea5126bb88fb8f7054fbecc8440bd20ffe172ab2856a572dae6fad0722352c6e450f38b15eefa1b2498f738f85e3de08d

  • SSDEEP

    3072:JWPqRkLYT35Ya29mdaM/9b8KRWmOwBcUbFbY:JCrnAx/9bPsUBb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    minta-eg.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    admin@123

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2028-67-0x0000000000200000-0x0000000000226000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections