General

  • Target

    1324-63-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    20907139f8e8dc8c1f3bbe7cbe553e43

  • SHA1

    f30d8f6eecd6880686f647e3736f47ead4b9ccc6

  • SHA256

    00a9dd69464376762bf39381618fa0d2e295b5c6a675aedbb3f17c6100f152c1

  • SHA512

    dcdaa0e3e67e1cd9157905cd9241f415ece6fc03f66e6b6241f7a492b16c2725f85af5aa68fc30461c92ce1392401485f0a92dfd8b086a305801a02ea2b13561

  • SSDEEP

    1536:op/tRIG7ySAvg4kSCZnvThmNvPFk6dMMFCQ0gQHbywyE6+IhxpiOWBeV:op/tea0I4kNZnadEQ0PHbywsjwBe

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.lgsportbike.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Iy!@#)ccu2

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1324-63-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections