General

  • Target

    4204-138-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5caf781fb9553be209bdd7efbe9be1af

  • SHA1

    8fbdd0308f802102dfad2c5218eafc81a45b2ac0

  • SHA256

    50dc311035c7850a361dcd0e330a8b3b3e65efe774169ee57b2cb4365d800a6e

  • SHA512

    6e2fde6b3feda789708c55134aa7a6e9b057eab66a1e84be57113f1b7da45c8dc0b8a114c4260ec13f2ac612add917ebc9700c2c2ad2aae232ab3f1754028d52

  • SSDEEP

    1536:zBN8mEXHsSvcJvl9g+vBUFrlYYGCkKRtvhvTils8MF0stczKgHxb/UOxi/v1piO1:zBNv6MRvlqGCqzKgRb8/vvwBB8GFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eculantltd.me
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ZXd~mnM}T9(a

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4204-138-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections