General

  • Target

    2700-19-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5049000ab59496fa98103614ade6b481

  • SHA1

    5849c46c38d0b381b98b1fe6d71ddcead650c2b8

  • SHA256

    7fe942322b55e35ccd698afdf7b80bf04fca29bb45dcb412cd6efc2ec9a35c36

  • SHA512

    d930262d8d52a87ad3247093f42ad0dce9d1c91aaddfcf33949ea9bcd5146da1dd503264a2da6400055cbda8c42f461b5a6c69797cd43f7168684d06f64745a1

  • SSDEEP

    3072:wa9q2DEVYUEcciPL1sfyblxTisQtwvxLo7L5gbY:Q2DEaUEJabM7Lyb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eraslangroup.net
  • Port:
    587
  • Username:
    info@eraslangroup.net
  • Password:
    aHZAyjDK
  • Email To:
    boxdraft80@gmail.com
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2700-19-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections