General

  • Target

    332-61-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    d40b4d9ac58b3ee2e10cf0b3e1d81f53

  • SHA1

    b032d2da2f230a7ac995b23284f4c2f4df99306f

  • SHA256

    5855ca8fcc699fe0afe39c0fe3a3d001a14d1fddf3fc5cf90e617874970e6c0b

  • SHA512

    47e1da675820b18e605c022970189752e424036998ba3a09dbfee2bdc3b8ec6d979eb8ad1651e0f026afccada048f626aea7bd186c995bdb5129f6a3fbb8637e

  • SSDEEP

    12288:me83E3HDei3oXA2jCXgXLz/HQOqzjW/N:mBU3Hq6oXA2jBXHnqzjG

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cantaredigitale.ro
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lendulet14net!
C2

https://api.telegram.org/bot5455879159:AAEEslA21OkiC675k778sJZDVmWZA0hIPJc/sendMessage?chat_id=5806341614

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 332-61-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections