General

  • Target

    2612-12-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    350d0eac8a13788e372f41df0d5d912b

  • SHA1

    ffe6683050b8e7c1b73124dda0bf0fbf97405c4c

  • SHA256

    59fb1644fbb0bfaafd838bad22cc91d15a9540e0c1879c2ec9c45a8943a94880

  • SHA512

    86319bee48e34ce0f83b9d32c055b2ae39c3dac172a9d5bdd86060bbf076d4ea6423f592351e86e86dc7d7b31b8c4d52ce3ddf56107c983faf88512ce504fb75

  • SSDEEP

    3072:bfD4/pdTG0V1dOsaBxX2j/Ab7YuJTwBlTxrgbY:Q7qzb8u+x8b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.product-secured.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    2V8SHFwjad34@@##

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2612-12-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections