General

  • Target

    2344-8-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    d1d2d52f2c806c809aa001a0a7b26cba

  • SHA1

    8f34a01cc86b61b243ffadfa93819994e37e6e36

  • SHA256

    f441a13c745abe5613854cdd28df25cfa5f460fecbec512299794d5ec3364c8c

  • SHA512

    e4dbbde0e7c54d58265598b10c434b47718a9e6bc95b1c99292c341f4351d423603836ccf18ea7351e4d39aa29fdddc78548a3a2b3c4c4fd614d0b3c3c956c2f

  • SSDEEP

    3072:sb+ltb4bLN9/QybO3s+9QCTkqIoUxbl6Zae0sQRwvxL8E3kgbY:dtb4HN9xCQCTkqIogbw2E3lb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2344-8-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections