General

  • Target

    4188-135-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    f9f4ff83968b5d57561d52894fd13edb

  • SHA1

    c4a482c4a431f22d312a502202db6f8c1a37b224

  • SHA256

    34eedd3d0b85b2b84883f0eba8a39bb003c6786ff5ddd276bd4b789dafe58617

  • SHA512

    149e2902b812280c3015598e5e192e2466c0a44a0a23bf07a11335d87ba3b65583dc8990f79b04e2d218e656ef91989d7740ba400d97a20d195ddaeb6fa92f09

  • SSDEEP

    3072:ImtcXls3DTs+8s/4RLjeq4aNb8OlwBZXFbY:I1ANsbO1b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5786528789:AAHQ0j7i85-G-y75MjKxc4haUReZZXoIzEw/sendMessage?chat_id=5044499782

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4188-135-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections