General

  • Target

    2340-7-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    eb82c63a6284187cdf1c9f54fc32974e

  • SHA1

    ac583a2b6f462ef9034f4a5ea6d6a1a93e37172a

  • SHA256

    4962dbef1eb384ceef53bded78f3abe0487c4db1e47e025f8142ad3aff443c01

  • SHA512

    93d651e8cd9e0884a9b0d75ea5f31fe8b35e995f77c9f7fa67f1203c23506b1c7aee0f04b567034b1117182d488b57ef6dc5f0960529ed58d83b31cbc78fef8e

  • SSDEEP

    3072:Hb+ltb4bLN9/QybO3s+4zSE7OblQsQRwvxL8E3:Qtb4HN9x/SE7ObAE3

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2340-7-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections