General

  • Target

    2540-19-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    b97baa1a81bd263152ac55ff1a12f9b1

  • SHA1

    11151bae55dfed2b7751451420884749da8e842a

  • SHA256

    78aa8da255acd49565dcdab82d5bf5bf9f1674c826d54d2228d3f3eb92f98df4

  • SHA512

    ce0436e3fac172c64712d63bc0d1e4d7220e7e8eccae8d8ade9250d236da76cb34a8a967dedc236e58ed628512799fa09a8abb3498798244045ef3bfb56cc5ba

  • SSDEEP

    3072:jBbLFMZFfbeWyGuynEGMUGqdSQjjblQBbsXBwv8LO4L:pFMZBbeFs5Tnbk4L

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.speedhouseoman.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    SpH@0084
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2540-19-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections