General

  • Target

    2432-22-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    0c89ababd8400271398171b670875cab

  • SHA1

    392395168de22bf4e8450d2e344fb202021e2a55

  • SHA256

    c622d3ee80eebf84092f42e123eab2edd11af811d7149c9f11dcdbcf6edf40c6

  • SHA512

    f321d99636e3e3e0e9082b94d9dcaab3f85a218ab5f9c63206ed001252c452707908ca55646d8408e4c51affb486e4a8ffeab93b8e6f3e33c378866da8ebdc2d

  • SSDEEP

    3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3:VpmNZMm7Lqbfcb3

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.stpgig.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Stpgig#Login21
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2432-22-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections