General

  • Target

    1604-70-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    79708bdb01207ce1e3ca43abd4f6b7f5

  • SHA1

    997b40c4cc70191ee6815226eac9317586869fcb

  • SHA256

    0a7bfc0d868dec9d9faed9ac56ed723dc3e8ef4a7384d291906edc1eafde7925

  • SHA512

    96984a28c130563a2f0f9d7ff450b9e27fa37a1c390e0756d486149620faba06730e4f4b46e3905be867cc5213e5b90d75eee7ed78cda9b141b97038c6e9879b

  • SSDEEP

    3072:l5H8Y0QrqSe5Y6F6zeHIkb8q4tzfPwB8U:sCM8zKIkbLCU

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    }eQA)VL2!$V}

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1604-70-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections