General

  • Target

    520-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    04ad2bb7ec67c7c67a74c86a6f74449a

  • SHA1

    0afe9be011d6950ab80f5c42695b00bc9b63724b

  • SHA256

    84b2d014b324608f94ea0983316ff8d1c12c593ace62bfe22a9329a8221fc601

  • SHA512

    c2c3c181562b50a84bb58fb09a1cc574f399c91eea50c667572f81ce05df0d7b838eebdc6b55447ba84c40d8db3065ff0f953141d93b67894e6453b011d586a3

  • SSDEEP

    1536:/PTbARNE4rkNqUd6dU4xi+vBUFrlYYBY7B+GxWgY5S65MFTTp7qiHotb/zxh5GMJ:/PTbINEQdU4ABY/Ib7b5JwB4N

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://posadalaprotegida.com.ar/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    rBmj!U6bgEm8

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 520-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections