General

  • Target

    3028-142-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    28fa7150f8e43520592b453ae491881c

  • SHA1

    9a64356c3979ae442936d3e6dc7f1fba26b58f10

  • SHA256

    99010e87ba6d87bac4009e10c5addfa69ba3c285f9e763e9edc416cd015c23ce

  • SHA512

    43770a6682fcbba73d67e2b555ac85f729a9834af58f5d9cb5be0305bf8724ab0a53d15fb536b95373a8175d568e5ffa582b40bab3c074a0bbfb6b32df5cc4f2

  • SSDEEP

    1536:+mtcOks6s+sSyJrZ6vTe1a9XcSCmWb/UZDVF0OpiOWB8GF0Kcl:+mtcXls3dJrZ6vTIzb8vwB8GFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5471298201:AAGFh758keN2eA73SQlIsmB91r4EW74GWCo/sendMessage?chat_id=5144477649

Signatures

  • Snake Keylogger Payload 1 IoCs
  • Snakekeylogger family

Files

  • 3028-142-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections