General

  • Target

    628-70-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    29c12ddae19cf9c447bdfefa927f0ba6

  • SHA1

    198e90d43fb0fe5cb282fb80796d69003db47b04

  • SHA256

    cc3192a0ad283157e005c708fed561b6a58c2e483b31e60fa776cb93a6c5e233

  • SHA512

    d82bb704e0ba21e752dc69cb0ba895a17c173ff80f2b9124005fa3b8fda112e829979b6e4b41c193abe4eb59d3af7f287db9f3a797ee746fe78308526fdf4005

  • SSDEEP

    12288:5oF73E3HDei3oXA2jCXgXLz/HQOqzjW/NJg:5odU3Hq6oXA2jBXHnqzjGJg

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.muktaaspa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    %!G&w4007t]O

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 628-70-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections