General

  • Target

    1492-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    d8c5267b19b2493c6041d18fda23523d

  • SHA1

    e6f3fa5b5a3af407f643484b3dafca35b7b4ae7a

  • SHA256

    3b18cdfaf6cde611a65b11d869f13560341aa689083eb763eb533f0dfffcf921

  • SHA512

    729177cf7bf5015df005281ef918c69cfee20ee6eb935d5fb0ec54e20c9159a10be604a48a7192daf9c93ce9e22e4ae03591bd88fb76b4f4f0f1bed1aeb6dd75

  • SSDEEP

    1536:DW/vo0dTsqzY0P08yyd3HbPXmKp1yt36b/UKWIROSCpiOWBN:DW/vo4s8Rc8yyd3Hjh1ycb8NxFwBN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1492-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections