General

  • Target

    328-70-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    06a23f89178fb32afdf64a0ea35af1b5

  • SHA1

    16cbea987d1759aacd56861610656cd557e4e343

  • SHA256

    6d252c5633977249f222964d4a749cc7a22f1ce075b4a4a2dc1289710d56d66e

  • SHA512

    04e65b43c3374ce38caf91be02ee3cb507b131f7c26eefe6bc6eae54aabf384bfe3f5d750a98ec910f590e7366f500231ee90670da9b1cbaf70f6945966e00d9

  • SSDEEP

    12288:5oF73E3HDei3oXA2jCXgXLz/HQOqzjW/NJg:5odU3Hq6oXA2jBXHnqzjGJg

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.muktaaspa.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    %!G&w4007t]O

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 328-70-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections