General

  • Target

    1504-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    49e37f57d52eaa487f4c5710e36a3a86

  • SHA1

    d1a5fedd492323393c039c6c370123ab1cf4e415

  • SHA256

    126feecbad385ceb6befb80a1fa2f685adf11c3182c56f2cda51e9dd5f357eee

  • SHA512

    ce200e1dfd715cdf4940d891bc4c9c967a8655799ed1f1927a3ed4bfcd076eb5c7f28a689802c3eb19c926feb6452d8515beb6530ded448faaadcf30606e1a25

  • SSDEEP

    1536:5p/tRIG7yShXvFh2+vBUFrlYYWZIkKxtmBvTClcWMFhE6uAIudW8vq4b/Ud2vRNJ:5p/teahvFUWZIygJ4b8aEjbwBI8

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.seyanqcy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    winners44

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1504-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections