General

  • Target

    2240-18-0x0000000000080000-0x00000000000A6000-memory.dmp

  • Size

    152KB

  • MD5

    b0969cde5a1f42f3d4c7b4ca896a2720

  • SHA1

    a5000b2867a36511575c822b5492636a99f6606f

  • SHA256

    818550c0dfa0df079225ff0a9b96f07549f3797ff2c92f4d0513fccbf68497f1

  • SHA512

    66ce5047844579b3715dc7d060e0229e165d1b97b7c369acbbaa7699c989bae928c71b5ab320b334e54ee0c79b8649926e02419fc4be31f2a8f2d82ae9f61f92

  • SSDEEP

    3072:CItxksC4RHxdXK1rMA13SjXav7mXRb07usrCwvxLx0agbY:/ksCMHx9KdCq6XRbmZ0jb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51
C2

http://103.130.147.85

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2240-18-0x0000000000080000-0x00000000000A6000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections