General

  • Target

    740-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    70861c2f34d55ae83421610a063b773e

  • SHA1

    e059f413a6bd2c25404b3e63706c697511e6890e

  • SHA256

    227efeea226364dc57e5ee7de6be0fb2616ac0915988746f1b13d480a936dd24

  • SHA512

    00d44d5abb9e5a797e3c59fe962a5fd3477a6ef49e44c5c6faff1f47cda28555d13c7550cda86ca17b66fccd0342b46de12464f0869791fd557db8628c71ca4a

  • SSDEEP

    1536:B5ZMR90Ckj0dhWxnKt++vBUFrlYYoZkR0TFs5RH3OQMF2mu/f4b/zPkmQc3pkpiD:B5ZM8CkQinKsoZ6hIb7cmZOwBBN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sienkakupeste.com
  • Port:
    587
  • Username:
    info@sienkakupeste.com
  • Password:
    010203sienka++
  • Email To:
    saleseuropower2@yandex.com

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 740-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections