General

  • Target

    1484-82-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    1e7c011eb82bfa65485c360150ee1c87

  • SHA1

    58ed1e248b3d3ba600d8b6948ca3b027e675c896

  • SHA256

    4666178ea6085d788636225b1bfc31d48b8d491cdf010b867e996d487e79d563

  • SHA512

    3c399f1c45acd7bfe6c19e956735955cdb1d29d0ad3c89f9a35b721ac4a3fca793d6832e47f3526866af5ffba4c144205b279fc3b19aca1dc31a67d828eb2f1e

  • SSDEEP

    1536:KhVtqTl3Nr2TCCFx0bE/l44+vBUFrlYYuqkaRt2BfTSlE2MFqQKsuebRb/U2MItE:KhVtIdNrSH/lvuqbLyb8/IZK/wBB8

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DreamChaser101

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1484-82-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections