General

  • Target

    1140-68-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    bf53c4f4fc4b25d3e568bf5213041173

  • SHA1

    20a41777b3675f9e8a8d2f95a327178bcb1fdfce

  • SHA256

    c9e790edca986918debd372f9bc6752ee9e7d13756c92c42201cdd4a23ec2ac7

  • SHA512

    ae7e5d658a8dcb825d3ed5bddbe11c6c7ada9aad8a432295e0dea0e8e2c6b4b8fc6bfc1d7a52f6b7bd297e8abd6179ed1b9fada0c8b69a6df5b91b6c04e4aae6

  • SSDEEP

    3072:B5H8Y0QrqSe5Y6F6m4AER5Tb83DzywB8U:ICM8bPbrU

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    PI#6XIKeoUkC

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1140-68-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections