General

  • Target

    1984-65-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    baaed3c7cb0a46e0d28b6d167e67d343

  • SHA1

    5f9a4988e58b56d544f663fcf01905db9f6d70bb

  • SHA256

    3a7601fc773e8f413e7099cc06cf0653ee276be9d2e5f027f1f47f24941a90e0

  • SHA512

    397a556e68300aaeb95983dd1f305d464a63f168262e5a52e85b3de0a52db0af5309512e89628cc94e5cf66ba3c94b75fe1462ec81ee64518f1cc9d847d3f3f1

  • SSDEEP

    1536:Hw7I18fTLxpVqBUPY3KkQ1s4JBMF/Ufl3+PGzb/zNWPOpiOWBmjN:Hw7I6vVcXKkQ1s4ftuOzb7+YwBCN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bulktz.com.ng
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lu!x)rxu*2cZ

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1984-65-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections