General

  • Target

    1328-68-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    c9547537c983ecd9b182e9da3e17afc2

  • SHA1

    06100c4e9a7b124da30d5bd407464619a3eee2b0

  • SHA256

    ecf888e68baaf7cd7bc735a9b8c3df36b7e4af5690025278f9181c791968667d

  • SHA512

    42850cbc54812c4c2a2b1d935f77b53e2c42109e694beb96f2a76b51e5ca164c0bb3267e906b04aa7b4281c571a994c38d17de42dadf0f3b442ba20d7c787448

  • SSDEEP

    1536:u/JPpyT+QR7WZ7zqDuuSCSkMF2r8w61b/U7TulpiOWB8U:wJPpyT/NKPqDXSC7gX1b87TKwB8U

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    TdW?q+.QevyC

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1328-68-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections