General

  • Target

    1056-81-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    8310cf8147407247912ed79bacd86781

  • SHA1

    de59a2cda2b46075c0f47354e64a101bd07b37ab

  • SHA256

    4f7288c43a099f0ca0af789085190e840a49d70a853b4169dc24cee0bb4c6ba0

  • SHA512

    9f6046cadc275471b61021fc4e28e99628d6769e02a60ce9557ac7184e00f7526fd797b731fb0c3a88a3b49d35844bef459fee24bcafa277ec050656e5029fef

  • SSDEEP

    3072:fJ38h0B/+aOKbU4Jb8IUG7AcwBI8yFbY:aqK2UMbokh8Wb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kV$bSqJ1 daniel

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1056-81-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections