General

  • Target

    1496-61-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    e968ee93e6b2be995f98441271709ea4

  • SHA1

    63969b9a5b9157aec317ea697e9c144e30ae9a74

  • SHA256

    ea14580e93196776e10addda691968d1b4b2c562be15d04f0a04c29890815702

  • SHA512

    8a8549154a7466f6e294ef3de4ae514a5a76d92c9d257fc5ae4f1df35c7549a2d8cdda71f9bc2289e298387b3278fafbb876ff3f36fcf51e28ec49dd34ae3c73

  • SSDEEP

    12288:X8O3E3HDei3oXA2jCXgXLz/HQOqzjW/NPa:XhU3Hq6oXA2jBXHnqzjGP

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cantaredigitale.ro
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lendulet14net!

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1496-61-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections