General

  • Target

    2088-16-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2a0a1e677881b6cd23ce321d500180df

  • SHA1

    505895f1a2ffcaa6a931a5116e0a018e903e95f3

  • SHA256

    40ee802db068006864e6a397a95bf1b4a2997fff54c32a300aad91d01c0de1bc

  • SHA512

    3b254a3c7b888a40920195220c602e0d8b539ba7ab3ae03153edeaf078efa665d8d32cc0a777310bfc0e4c531a5dce42437cd5a73baec904122a4f99a6a786ca

  • SSDEEP

    3072:dZHRYTcxL41EAamulCfiJtX1b0j9lrCwvHx0fgbY:RYTcR41REV1bu04b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51
C2

http://103.130.147.85

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2088-16-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections