General

  • Target

    1484-69-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    133417e0a28a672dc64aad90c1d3a7b0

  • SHA1

    1abc01ff3246caeefa330ffdefa55920c443ad69

  • SHA256

    467b6fc395ec16c95b310d09b9adba6fef3b88a2d09804893933991c72a310c6

  • SHA512

    48b9cd1485fe787ed1cd0be8715861b5e8850343a4f82057909204442aad10382a948cf346b204071ba4fd4cc47d09dd3309d148ff0921eb7f4877bd347eaf83

  • SSDEEP

    1536:sg7I18fTLxiA9LhIxjxG+vBUFrlYYkkkdGqN6gAiy4KMF6SEttZmnnnfqxpb/z2c:sg7I6cGIxjckkHPmnnnfCpb7JewBBV

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    25
  • Username:
    triihope931@gmail.com
  • Password:
    iebtzpacgzyullvo

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1484-69-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections