General

  • Target

    1872-69-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    20ad6b052b85230da5015b903ee25df3

  • SHA1

    39578cf72136b5e532ab8946c6dfb478e11d4161

  • SHA256

    faa67140fb163e020ff73369a1a39bf8a771d679552194a4ca0a62fcd764ebbb

  • SHA512

    e7e47eb1c9c8a977e4cd9fdcd1dd0e9b3306fa82fca99f777e720dd8349bb71aafa6dde7e21b80c13fd2b313725869d8d7d3763da091210850de9214e4fbd9c0

  • SSDEEP

    3072:PpH8Y0DHf+beapC2z9ksb8yB4QRpCncwBI8yFbY:SFzebCQfj8Wb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ^!uJBr^9 daniel

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1872-69-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections