General

  • Target

    2204-18-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    05971508d507acbb1d20e4d87cd1948d

  • SHA1

    93a41997b7f5c27c9b4e2c7338a6f08f958caa69

  • SHA256

    d9c5f73e8ecc2684aaa6819521f2a7b25578bb1312e3ed8e87b50abac352ff32

  • SHA512

    7c0e3b09b6bbad138f344cff3ec14bc329a1821ca53ab4132f537c42ccf8d5aebf2a4ad7d78c02988203ba4b4e63a65bda9bd5d4e0918d8f0f086b9808f584e2

  • SSDEEP

    3072:cItxksC4RHxdXK1rMA13SjXav7mXRb07usrCwvxLx0igbY:5ksCMHx9KdCq6XRbmZ0rb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51
C2

http://103.130.147.85

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2204-18-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections