General

  • Target

    2000-60-0x0000000005040000-0x00000000050BC000-memory.dmp

  • Size

    496KB

  • MD5

    ff575b4ae2880765a12bec2a221d1b0c

  • SHA1

    ccb5cd0885dd28c4ee2dcae6f8796856ef96ef29

  • SHA256

    684229a7640ad69c6386374fe2b82429c37405a211d8efb482f900502dd223a6

  • SHA512

    4d75f65a4d497b1d8afd602f22d64f6aa2842113f9ed405cf6fb9b26ac1b5587b4b092914b6e8f6859de140538ee7a406a0801d91f712aace64cb62d9e5d3530

  • SSDEEP

    12288:rk3E3HDei3oXA2jCXgXLz/HQOqzjW/Nh:rkU3Hq6oXA2jBXHnqzjG

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://194.31.98.108/
  • Port:
    21
  • Username:
    fjghfgjhf2
  • Password:
    fkgfgjfkgfg

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2000-60-0x0000000005040000-0x00000000050BC000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections