General

  • Target

    1740-61-0x0000000000340000-0x00000000003AA000-memory.dmp

  • Size

    424KB

  • MD5

    7d66c1ec9cfc00529b83edf20e80d25f

  • SHA1

    cf3a48a422cfe866b75fc82d26886ebce3bcef72

  • SHA256

    d90daef654b57a20c6fa80a96779c81a5cfbd06a533fcf00dfe763566463f0d8

  • SHA512

    818b2319b4de34277abfe8f4a7610710d1063a4b5f7f5d5d46e53237b59d82128b136dfd65189200ec3ce5a6fba810ace143dfd424547d66fcf5353f48642f89

  • SSDEEP

    3072:9jhkGu7sra8TnhLznBdi2CaMdyeci05X8eaMUDY4P3CIXyj6x/P:bk97kaqzC9we8B8eaMO3CIXy2x

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    pro40.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vexa@2013

Signatures

Files

  • 1740-61-0x0000000000340000-0x00000000003AA000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections