General

  • Target

    2764-7-0x0000000000080000-0x00000000000A4000-memory.dmp

  • Size

    144KB

  • MD5

    18ee5bdacd01ce6556a48e226cacf574

  • SHA1

    60e439550fa3395ac2a392ca2a943731ad731206

  • SHA256

    2bcffe87fbce9343bd1d93c6e2bba3c4a6175f0e46390fcc25e34111a20d8a2f

  • SHA512

    9ad6be1298f37d096e4268b906f7e52559d57808992d1483fea6a9ae0039571cd5e84da955fcd798962b9517046fa8c677f54b87e6f65130ebc0e93e6950ad42

  • SSDEEP

    3072:5fD4/pdTG0V1dOsaBxM3buGdb7wJwBlTx:e7qSPbTx

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.product-secured.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    2V8SHFwjad34@@##

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2764-7-0x0000000000080000-0x00000000000A4000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections