General

  • Target

    1292-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    7e50c60cfc7722d60ca3e5c3ded250c2

  • SHA1

    a4262aa851c917c16a2b49be1c63e5b8a708374a

  • SHA256

    2fa96a52c8c9a36e2a2ee5fa2b736f69e9b67712b0f1ac8da2498ffed8ec2c2c

  • SHA512

    150c95b4e9d77ee3a545f3b756b9045938a86c629d47e07783909a2074477d8fe51393697e65244a374a127c1e98a3d29685e142f373f54aeca254e2163ab6c8

  • SSDEEP

    3072:tJPpyT/d2vu1pmiAR1tMb8z0wBI8iFbY:ZyTV8XbibH8Gb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    rsgraphiteelectrodes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    EA3fDWq3?RQ2

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1292-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections