General

  • Target

    2412-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    4d6cce50dd95176a656e04da08cf726f

  • SHA1

    843c3f41f6b4d83d42dcad4043481ce710dc35dd

  • SHA256

    687324d91218675f3bd6dc7b812a56248f3969c2728ddb062c37d2540e3eb272

  • SHA512

    7b9671fcfaea3eb545b2e3ff7aa60dc67a81e0144bec0e3ca6832b52827f83edf1fe002046130897fd867c07ae0eb93c56a727c796435fb05597a7c7910852f2

  • SSDEEP

    1536:+zN8mtZeW5CHWCIXEES4ODJW7OUxLuLrVSiPCWVUb/z5/Orz5mpiO5BIN:+zNvtIWEKXn5OoOUYXPNVUb7dAgfBIN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kf3BZw66mfZeyhM1

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2412-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections