General

  • Target

    2080-17-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    b61f45d098ee0728fc53972c6e954d1b

  • SHA1

    26aa64d926ff92fc199213d5cb0b257bec6fbca1

  • SHA256

    1805f51de4e2ba0e8bec533973778e144364fce4e576b0de0fd9eee4c34bb74b

  • SHA512

    d0ce8ac0c40bca064f9ba4ea4cc02fc98cea24d5cddd8b20f2114ae142590f6b47c6bfed39365f005df2ef75e0131dccb440056f6d1129a1a241e100bd123118

  • SSDEEP

    3072:0ItxksC4RHxdXK1rMA13SjXaH03Xik2n4Fb0Kvvsr1wvxLx0GgbY:RksCMHx9KdCZKn4Fbz0nb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    fY,FLoadtsiF
C2

http://103.130.147.85

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-17-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections