General

  • Target

    2360-13-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    149db81421f6c5203672d564c808c6e2

  • SHA1

    2af1dcacd36f57bcce8fcbd7b46f043283f4f34c

  • SHA256

    fb86cd3ab1f3eb021ef83db016810ab47bd71a8c90e66d96e26a211252c23e63

  • SHA512

    4b0f9e1804183691a45717d6a9636ccae7e034e9c50b97277c50ac099ba3c8d018c010dade6e3f6cf05ef2569cc637b9a24f8827c7ed86a945be21b94280d8b5

  • SSDEEP

    3072:bS8LRTAxWteevj+QEa5Ifb5NWsL8twvxd:BRTKu/5IfbTCy

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.puragenicindia.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bobbyj2016@bobbyj2016@

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2360-13-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections