General

  • Target

    376-63-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    c41bfda26da504d738138c77f52a3716

  • SHA1

    ab1088cb237432fbd6970bedb47c0c88cc7d4f59

  • SHA256

    5e13b372b3549df07e23095969ace51fbd8c4319a626746d0f22114f1e613e7e

  • SHA512

    87d87d3bd0d93efed9150e58b83a0d6e534ce45f3b5b4b5600461bdc9a789a66abfaa20545106eefdf4c5db1b8ec1b032d2687216f449622792f32f53a7447f1

  • SSDEEP

    1536:dp/tRIG7ySAvg4kSCZnvThmNvPFk6dMMFBxrVS08bq4msZvbyNWQfwpiOWBeV:dp/tea0I4kNZnadZVS0MZvby8YiwBe

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.seyanqcy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    winners44

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 376-63-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections