General

  • Target

    3052-11-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    fb7a2acfd5f322e8442233cb83412f00

  • SHA1

    fa42086ee44637f3b4709cda63fb0e960023cc48

  • SHA256

    d266c302612574fdd2ff8c25d7548eb0df5b836d248231a60b66ed662e6cfbab

  • SHA512

    3572c0b08f21ad3364026c22726bf1d868d2d316d6c32e77d7c0a7b29afb27ae5ebd5acf0915f6ebcd5c7881c9605ec1e53caebb345dedbaf7a9723d1566c79d

  • SSDEEP

    3072:oy4vdnls38SN7jaXHTib5AVnmWhwvcXmEgbY:Udls2H+b2VAFb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.emmioglu.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kaya2758+
C2

https://api.telegram.org/bot7824402550:AAF0zLhO0leZXvzGs8C_m31pnXq-KGoVm_I/sendMessage?chat_id=6651428318

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-11-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections