General

  • Target

    1948-63-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    00335fc8e705b5688aa6fa546390160e

  • SHA1

    65ea51ea06970a64f7998a27c1963cb45ace6ec4

  • SHA256

    30f3bc14a47c1ffe4a5ca7e79ebe97661bb90394dd90fee36b0b8e82e041ef94

  • SHA512

    ccf0270628b2d757c9dd2111929732eec3ac1934e032ca7b90ce428f9cb07626ea14bf9191c4b585ec78febe8c36d6c7e901a9000672aeb06d322ab51daae6aa

  • SSDEEP

    1536:op/tRIG7ySAvg4kSCZnvThmNvPFk6dMMFVfadVQ7+ekPt9byNVj+9piOWBeV:op/tea0I4kNZnadwegHbySHwBe

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.nnntgruop.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    xeZUiXC0

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1948-63-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections