General

  • Target

    864-136-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • MD5

    01f43a4f3dba98010d35b5236155d0d7

  • SHA1

    c0db6388f4328eabe55740f6368e115a55a3178d

  • SHA256

    e458c6a2bda444c2a8c17615642970709cba2061694d29400a168e330face525

  • SHA512

    ff33d2bd891ce4998b12b32c44a6c34e43bc5aa6f735df8c87000542a43e8c864dcd0b4ac0d0845482aced993cad1faed2977859ee4d13804a322ddc8bae1001

  • SSDEEP

    3072:9jhkGu7sra8TnhLznBdi2CaMdyeci05X8eaMUDY4P3CIXyj6x/P:bk97kaqzC9we8B8eaMO3CIXy2x

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    pro40.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vexa@2013

Signatures

Files

  • 864-136-0x0000000000400000-0x000000000046A000-memory.dmp
    .exe windows x86


    Headers

    Sections