General

  • Target

    2008-63-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    ac5497a1aaab963191df82bcbfb5bf35

  • SHA1

    b04865cf3aa7cb108e6059444bd1d9ee55354a82

  • SHA256

    2aa1425ae70e6895a87f35ff87456ced30515e5ce57d9e590b7f1e8395db879e

  • SHA512

    e0124af4278873c97642ed5574dd9f5a6904ab2c705602f94179434bc7bbac09c00db125bf65ebfae5e1d7517093a8eca923cc0af2dd1fcdca18660193bd47aa

  • SSDEEP

    1536:hp/tRIG7ySAvg4kSCZnvThmNvPFk6dMMFgRYX/c8+abyDJr8piOWBeV:hp/tea0I4kNZnadWA/YabyVWwBe

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.seyanqcy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    standizzy12

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2008-63-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections