General

  • Target

    1560-72-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    dc03f963107608daa7c1e7c5937ef53a

  • SHA1

    3df98f50df52ac1563b395a038a6c170f3e0542d

  • SHA256

    497a669d84cdce2cf5968baa2d3bfa2445c1c649f7c0255f0da93d907c3b5163

  • SHA512

    fa6eb82e92a7fa966eb83c5f2c7447b2b1082013c539d3eef586c928acd3d6c370cb04b2ba0451b198d25c4ecca29f1b3ef09d5d85eee28f066bdad48cfa061d

  • SSDEEP

    3072:V5H8Y0QrqSe5Y6F6FWTb8dOhXwB8UfFbY:8CM82bBnUNb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    j@LB3ft*]^6O

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1560-72-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections