General

  • Target

    1112-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    6201f15eb50b517b7b65385050ab1e25

  • SHA1

    ef51c5eff1861ad2d04aa691d79229dd42fc5f1c

  • SHA256

    639b85bb0f718cb8bbf655b845589477cda67210c806e5920307c4de1038c709

  • SHA512

    eabaa426c942282399f7440456d6e6ba7a7868565cf75d574296c2854e82e036c3721a32f218f265834f3419e2f2a2a699d7272f84bc4088596fe75144628ecf

  • SSDEEP

    1536:OXnVBqsWZZ22nrLHgr3HOfEd/1E3bskZZIMddQNdgb/UCec1npiOWBy:OXnVMs0nnHgr3Hm79MSb8+1pwBy

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1112-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections