General

  • Target

    2728-21-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    8b505546521c07898109b6160354a2b9

  • SHA1

    71ae8bb031a046419fd3c8be879f78c91f83ef12

  • SHA256

    82d76342175ca8df91b27bfcec121d261829b04af3987c3f21f1866df9efc796

  • SHA512

    c8664e66e8ab6b9d1e456ecf0339ada5f771d3265630f46708e0dbe0f7e108d63445b451443311baeeda3c2d73c733aff1bcffd5b6ece6abac50e6b7b89bac17

  • SSDEEP

    3072:0sNysCOOYZLFvZB9zhg8wfcnnpMBblOsQYwvxLO4L2gbY:usCOLZL6DbL4LXb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.stpgig.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Stpgig#Login21
C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2728-21-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections