General

  • Target

    2600-9-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    a0f25db37d62d9d78e4e4a666a558dd4

  • SHA1

    70f1dbd401f8120ca074ffd9588406a66c46ea1d

  • SHA256

    fd8393e8998e2a09a2374793eea1a427d73b8d157a3216f692c43a97da2c2f98

  • SHA512

    e7663abf6944b0d48c0df4f8230cae2006a0e2b03d757016d48ae59d9daec9f0c008c5f0768ffff538ecfd633823fa4a2bf6db4a48522b9a64166f2a57e13cc5

  • SSDEEP

    3072:sb+ltb4bLN9/QybO3s+9QCTkqIoUxbl6Zae0sQRwvxL8E3:dtb4HN9xCQCTkqIogbw2E3

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-9-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections