General

  • Target

    2880-20-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    995cf5cef14a214b9e658a1e04b91457

  • SHA1

    5f9dd6583548a913957b24a4e56c16796439380c

  • SHA256

    884153b7d16dca7d17629e4a861cad3c44a626a8c411adbdeb27a232f5d4e2a2

  • SHA512

    8df3093cfdaa4b3a71ccdf45e26b899bdb7fda1e08a8c776dbf8ea515d63ca91a6df27d214b25d4293c7da234e66dcd17283998e2477cbd833a2cd5918315a40

  • SSDEEP

    3072:Ep0FfnHoX+b5HSSybaQor2rfCXc/bad0HYsLBwvxdZGgbY:BfnHoub5HVc/bZmZnb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.remfryson.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    CnG_23*NMA

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2880-20-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections