General

  • Target

    560-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    41e3798151cc477133f2e0aeac64a408

  • SHA1

    82503e1ac1fc4159c03f8c1dcd1a994300bf2f69

  • SHA256

    67c8affb9ad535fb4f5b54daf05435de15372b94d7877b24e945bf0f00c95a4e

  • SHA512

    a063e0b65270aa4f879f93fac4ec9a8f668d31aa9eb7b2ed75389243ea6ffb14d0e9935e69c353b48da409d5c3c4ba3de52ae1fa8ad9c72f621bddeee08e6eb3

  • SSDEEP

    3072:qjF+53W7VbT3+TxtU2rXdqb7drEuFXfBIN:L5m7mrJZqbauEN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.omanindustrialgas.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Oigc@2022

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 560-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections