General

  • Target

    2596-8-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    7a12249d34f2d1df2ed295c533b86af8

  • SHA1

    40e4bd3852a4f7e14a3215a74e2509f72de17998

  • SHA256

    f57cc339903ad009bd08f5ee6db97c1d475b4e93e49730d468d2ae3ff1e42d51

  • SHA512

    66125f8933e34a69c8f9ffd5b3c544ccd2c83a4ff3a7f10819da285f8f0a195e841416e094564e773a0eb1615b5975de81b177b0a6ae4fc873beaee237c7eca7

  • SSDEEP

    3072:igV4tM/zKl/jC0SgW6K9MtbblnAmBsXmwv8Ls7LBgbY:atM/ul/FeAbZAJ7Lab

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gbogboro.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lovelove@123
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2596-8-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections