General

  • Target

    2684-16-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2fc96e7230ddec832ae0a73f1dd69aa7

  • SHA1

    dc9db212330ed8a3fe12c32d84db19f50f0923e4

  • SHA256

    8a38f62db72e0d235ffc993b2342b1bf15cf865cab1c1c28a035f5aa3b9799ed

  • SHA512

    355109425624dc20f6e1a633d5a2b484319df997306da5e8c7dbbf47f59bb9bc11b1be0382c84c47e48ee45ad03ec83a9e0cc8e87d274ea6ae287a83e91be928

  • SSDEEP

    3072:ygV4tM/zKl/jC0SgW6KCyVtjblgEsXSwv8Ls7L:qtM/ul/FVyVZb27L

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gbogboro.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Egoamaka@123
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2684-16-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections