General

  • Target

    1872-69-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    dc91c2f32a9c6b4899f4d71305f05485

  • SHA1

    7a6d2ec19757eb8b41ce9933dc8ada4caa5310c7

  • SHA256

    514665d91c384bf1e743ba38105c460c13e9e1d6ab9698f4e0776a07d96c9392

  • SHA512

    c17cad3d24fa633ff5918f75456cf537cc1115c9d8268a93c2e04ceeafa7775ff5e693afbf460ec582189c3ba4228edd5459fccb60e61a9e0933e72f1fd34d01

  • SSDEEP

    1536:V5H8taABwPT7nqiJe5Y6F6hIMFFbWXRxb/U4iOhNpiOWB8U:V5H8Y0QrqSe5Y6F6FWTb8dOhXwB8U

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    j@LB3ft*]^6O

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1872-69-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections