General

  • Target

    2560-18-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    d28316803687af11d5fdd194bde33da7

  • SHA1

    d93883390674d6064e71386ec6997ec891e812e0

  • SHA256

    5c06e308c24a967ef54b7f82c6059403be1009fe00f300a3a746ea4df6e42557

  • SHA512

    f12fc1af6b5c01f5531d227847be9596b7c43600c1a1f008945be1dcb95d32a04ddcb8ffe644aa17f53c1f8704cf53eddd79451325a54096a25ec86f21c505c9

  • SSDEEP

    3072:1gV4tM/zKl/jC0SgW6KbovWCzblMVsXDwv8Ls7L:HtM/ul/F8CzbSP7L

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gbogboro.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lovelove@123
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-18-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections