General

  • Target

    2728-23-0x0000000000080000-0x00000000000A6000-memory.dmp

  • Size

    152KB

  • MD5

    7dfb374cfd14f7aee8284e55d0dfc8bf

  • SHA1

    5f1a11b09a228e37b389ecef3beb7d572037a7a8

  • SHA256

    e0571f627885d4bbf6da1e6e7a98973d063f23bbcedf9332a939da71c4e2ea09

  • SHA512

    edb036c12721b68070421b685ce3fc0b28de83308cb65a6c38c60bb9791ff361516e44876884f86292c3411b1a56a55ebc6afa252a23171fd5f231b12e0b1f86

  • SSDEEP

    3072:UItxksC4RHxdXK1rMA13SjXav7mXRb07usrCwvxLx0agbY:xksCMHx9KdCq6XRbmZ0jb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51
C2

http://103.130.147.85

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2728-23-0x0000000000080000-0x00000000000A6000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections