General

  • Target

    268-61-0x0000000000400000-0x000000000045C000-memory.dmp

  • Size

    368KB

  • MD5

    68bc04487b3ea8c31d220afa165b7970

  • SHA1

    aacb96cbfc967326a915557b9f597388efadb6ce

  • SHA256

    ae9a77d749838e864b6d8e6f4f3f4ca0b06da76ad956eec40b765533e296e9ba

  • SHA512

    127d23e8c0c5bb90717667bc2e067ff0d3c5a21cd3e242cf882fbe196f1078dc61d8f5ecca297aeca0f32b8f2e44ca60233316dbba9231624bcd177cbb66c7cb

  • SSDEEP

    1536:QYJTpiEkP6ejpafPDZ3+vBUFrlYYOMkGA4KsaF4cJ8MFnpOAh3NSskb/ULZSWW8C:QYJdXsNwPDhOM0v3Nub8HWWwBI2

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.linda-ks.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ErzaLinda2020./
C2

https://api.telegram.org/bot5634627589:AAFwx4pQ8MD3ucRRs1LDHawKlR98KkWR2qM/sendMessage?chat_id=5798274961

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 268-61-0x0000000000400000-0x000000000045C000-memory.dmp
    .exe windows x86


    Headers

    Sections