General

  • Target

    548-76-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    9668167d8c1f29caf00eb9872acf0adf

  • SHA1

    2d733dd97770cd166c0f519394f44e1c41253dcd

  • SHA256

    1c01bb41f1857342fed697149a0236c551f6b78b2b6bbe99624c5aefb5b7215f

  • SHA512

    0bca93ad66533567274af2458b93c8fcdabf3a204ec0391cdc18c1555d9a3cc7859e7c88b5e88c26ab6296cd94349e3b54e7e462e2f45f3cf3f9d70f83c2c06c

  • SSDEEP

    1536:xjdKxVAyl0ga6hnnTYm7++vBUFrlYY0k7rhybNbmJ11nMFQOP73jC9m9i1Bb/cjE:xjdK8uHa65YmC0kjyTXw1BbU9dwBFb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.kattanqroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @QOZ@qs4

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 548-76-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows x64


    Headers

    Sections