General

  • Target

    2036-60-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    a80524d7807127f8c3caa758c5db969f

  • SHA1

    eea529bb44d2b202b8c03cdf9827f024d7cfe31c

  • SHA256

    cf4a7dd833f3c3235b0d187a32bdf8bc57119dbb7c6cf00806d4ca41e83c48dc

  • SHA512

    a378a8edc0f7403817c3e90636c00b991602873b80b47e733ac296fb7f791feefce4614bb8e3cb332372b4b2a814cf3b59582876c3054d7b8bc0baafd8d79ee2

  • SSDEEP

    1536:bT4XMsS7/6JR0GJJA6XbDeBLtlOZD/txojMFfesUqHY6vObGbIbUXLiEVN1npiOS:n4XMbTM/A6XbDeupGbG86i+pwBM8

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.freshfada.com
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    GRACEoverflow123@
C2

https://api.telegram.org/bot6010601014:AAE_RJm-2igP99_YnmRQZ_TajH6dCuBx6CI/sendMessage?chat_id=869301167

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2036-60-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections