General

  • Target

    1164-15-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    27477231c67049253e8827909c7a3ad9

  • SHA1

    7a991d08a720733fc8c31505923dde551917cd56

  • SHA256

    7c23c0d22225ed5e1419e76340b860f253448509523ab73fad6e631ba9f6dfa1

  • SHA512

    44156e3e0b1ef4fab5cc5210b5cfe73e3d338eb3d35714c9446e99a45d71bb37b40bdcf9c93c747796a794d952665a4090e921974e1337ddf13389117b66e0d1

  • SSDEEP

    1536:kOQFoRxLeX2uiiGvh0ePplH+B/qpjWrLVcMFWeipsG248bVkzYMZfpiOWB3n9g0d:1QFoPLPzKePplH+itibVexwB3n9gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.1tcl.com
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    RRa*ysS8

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1164-15-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections