General

  • Target

    2760-7-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    c5e432b001cd79b29ec0372e45f102e1

  • SHA1

    68664435f072e22a36d22c63c2e5da8f0f06c7b4

  • SHA256

    64d02854577baf87983ae93c02077ebf9c5857a90d5590878d21c5b569281697

  • SHA512

    246c95a7f134e0bbaa6624570dee33f65694898682760d411c3f2bb16ef5804dc80a6ee727048da712a055e9a39ac778a0b2b70f6cfa340bef142cd932235123

  • SSDEEP

    1536:Sw1/iDIVFJ9fW0rfMca2t+vBUFMlY6FS9jYZjRwL9QMFkJD8zq5iDPDb/z15g8LO:Sw1/isK8UcaPFSfKk7b715g8LPkwBgZ

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gulfparksuites.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dammam2020

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2760-7-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections