General

  • Target

    1220-138-0x0000000000590000-0x00000000005FA000-memory.dmp

  • Size

    424KB

  • MD5

    40c0762601d8770566890bdc50ed1b14

  • SHA1

    357dac1c85a1ee4b051ab09723eeac22ba11bc3d

  • SHA256

    bc05869714f43ec8a47c241b3b9c785ab8733930fdd2ae69df25eaf64ed55d7f

  • SHA512

    a8cc4b603d6e5d567185b20d856602743f39d2bbedde535c62722e5f0a3eb936b57d94d311bbc24b3f54bc0def2eddfb55fe833b1da9f345e4710bd2f58a8af4

  • SSDEEP

    3072:9jhkGu7sra8TnhLznBdi2CaMdyeci05X8eaMUDY4P3CIXyj6x/j:bk97kaqzC9we8B8eaMO3CIXy2x

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    pro40.emailserver.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vexa@2013

Signatures

Files

  • 1220-138-0x0000000000590000-0x00000000005FA000-memory.dmp
    .exe windows x86


    Headers

    Sections