General

  • Target

    2784-10-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    b05a4a298db164d36299f7309de7c69f

  • SHA1

    1fb6cf3b7afc507713dab53b0005ce79aa027dd8

  • SHA256

    881b064e86757f5bdd8473b64050d77e80de2f0655fb2f9ea2f4390fa963e125

  • SHA512

    d69a9536233f0f2b42981fc63350e2f7d04df54629ad80c18e647251663edb8864738c222afc3eefa8001d3c2fbd8b216a02a84d0624eaa512658233d2b5bbc7

  • SSDEEP

    1536:Uyw1/iDIVFJ9fW0YIz88TE68xCA6BIOdMFxI81BBDF2EbVdczd3A/piOWB3n:Uyw1/isKBIz88TEtBDdbVqVARwB3n

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ozakaluminyum.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ETKghx*c3KoQ

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2784-10-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections