General

  • Target

    560-57-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    b1fd451754db23fcfdc338b674c0e527

  • SHA1

    13c1e9ba4238c0ce8ddfea83fcf182c4ebd849cb

  • SHA256

    87d6ca47bdb0cda36f4d89bdb8eab3e2a8e433bec3c92601c13de44578fa3759

  • SHA512

    c36a3f5d6beb0347793f2eeae85433b6914018f9b1d423983d5bc4cf9a90ca61bd35459587ae6c8ef08ada003def926589f660b9449389d57d3b50a704c4b37a

  • SSDEEP

    3072:fJPpyT/m2vu1pmiwkb85yGIwiwBI8KFbY:7yT+8sbBB8+b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    rSOqKO!0

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 560-57-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections