General

  • Target

    2012-12-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    1914e3b1da4bd53e2e01f8c4fcbdbd8a

  • SHA1

    9d4efd63614cf31f6369d542f579e19175a2adf5

  • SHA256

    e40716e7a1e29942e368784564908f4db18929cfb2754b0944b965997060e16c

  • SHA512

    64d5aac47fc06ba20322ace4f30bd70672113f84cac16a492eae998d479b8f6370ad22deca8ff39af3a4a6dd42f22314fae958191eee22eb3dbdb98f46f18369

  • SSDEEP

    1536:+IyrMBR29HphWcaE/4Xrzi+vBUFMlY6nM9BzEVPF0faMF6OsXAjib/znAZOlA9Y8:nyryR6jag4XrhnMbswjib7gB9e2wBgx

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-12-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections