General

  • Target

    2464-22-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    faa55431d1d6585c0059e4c7265e3960

  • SHA1

    18cffcd81a80b8868b8cc88288070f37b8fc917b

  • SHA256

    3c6853dcb899d1bacf4233f2e550ca6d5e9705d03e86e20b24a48ab7c0b57f8d

  • SHA512

    772a523347eef8119ac47767d2e3ce2db4c2ef9da68bb5ff72ee3723e4d2c366f87aecd88e66ce3f19c0ca4dc4bd6dece71dbea3b2341a75569b1d39e15eff6e

  • SSDEEP

    1536:z8QFoRxLeX2uiiGvh0ePplH+B/qpjWrLVcMFWeipsG248bVkzYMZfpiOWB3n9g0d:AQFoPLPzKePplH+itibVexwB3n9gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.1tcl.com
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    RRa*ysS8

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2464-22-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections