General

  • Target

    4896-135-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • MD5

    9460b51432081e48a3918e9e4cecb40b

  • SHA1

    beabe254036f35d5255e919fb33109be75611271

  • SHA256

    2fc600cce00982649089d4c384a1b0bb9c1bb149d0cbb3e0682d5330f3ee575f

  • SHA512

    84638c82f9a054404194b39ddc3acc29f5991de994aed6f18109b222e7ddba19b265d255a0627b3deb854c6c710bdf9dc45c80d64d2c5c3f1fc92b18fcb3bb96

  • SSDEEP

    3072:JMH0sgdNkpmc/aOAB/vA3ikQjLNln0XzqZ2pyU4Hi8fvVM6FX7:CUXBRdBA3ikQjZln0X2Z2pybi8fvV3F

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sgyemek.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Muhasebe2019+

Signatures

Files

  • 4896-135-0x0000000000400000-0x000000000046A000-memory.dmp
    .exe windows x86


    Headers

    Sections