General

  • Target

    2012-60-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    7bfc71f31fb9fd41af261261b7342d33

  • SHA1

    497a32ee0f4dcbbd6357fb2a120b336c9be92426

  • SHA256

    64101e5d1dbfff919cb9bb6e1e2372b5ce8739ab16ae069262833d98188c6830

  • SHA512

    29eadb6b418ca93b15f019bad40b2d41b9f5ecd8245685235ecf0e441ad2b7c948c66719267e1ab53a63a1e3ecb549793c28c4cf762dbad679e4e4bb0453c132

  • SSDEEP

    1536:hw1/iDIVFFA9rhIxjx0+vBUFrlYYkkkdGqN6gAiy4KMFH6VfciJAMVIb/zjQ7NPM:hw1/isBuIxjSkkZ1JZIb7KoYwwBIV

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    uglyhousebuy.com
  • Port:
    587
  • Username:
    win@uglyhousebuy.com
  • Password:
    ]YSPgjNCuF;W

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-60-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections