General

  • Target

    768-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    6883794d34b50b80a3ab8d5146f34379

  • SHA1

    0f32437a26948412617388b0021bdee8c4a59ecc

  • SHA256

    664329efdff53ab2fc410a20b2688baab9a97dc9219f8c6ff4eb164843fd4f72

  • SHA512

    3708bfdcb17d1fac0c2e7e53542612f77e056d07eb24e4504a03bf1e7ad54f1a53b4f2d5048615126c95607a42948501afe302e911b03f704991f635f39b6f90

  • SSDEEP

    3072:rw1/isBuIxj6W7jPPY9b7IKvhBvwBPNogbY:Kiwu2bIbkK+Nxb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alhadafkw.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ghazi123

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 768-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections