General

  • Target

    2320-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    576ea88a2af41f842bed369ae454cf1c

  • SHA1

    e4647840bd43016c41e906ef3f09961d85fd2d24

  • SHA256

    7179a9044874b3950a3f85dba192d9735aa46ee70d62f403b6467fde50f5eafc

  • SHA512

    d23a7bae5174aa9fabea507a52b69edd3ef75de8535e5b67d85790870a5f2a94dcd03278cbc5f842b7167ab2c2e9ada489df81fd996aaa1fef01ff06ae29e895

  • SSDEEP

    1536:zPdT62gHBkCq6PZH9rDNMF9OPLKqp3xghwP+Eb/z9HxtpCAE16piOWB8N:zPdTdEqF6PZH9RBghyb7lpCAE1swB8N

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    198.23.221.13
  • Port:
    2525
  • Username:
    [email protected]
  • Password:
    admin1

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2320-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections