General

  • Target

    1512-68-0x0000000000400000-0x0000000000436000-memory.dmp

  • Size

    216KB

  • MD5

    d72b403cd2ef0c3a7603e8cd14a70b8c

  • SHA1

    b0af708b45f2d195c07ac43a6eec9e2fefc19763

  • SHA256

    56ee8f88883dadb5c7805f54232bdef0529559ec78614ace6842f56d8b599a8e

  • SHA512

    652d06b56e18e391ec73a2f020349efded90f43b9e849768817451ab15c049e9ea7e193a9cc49fb2728ec685d610331f90ec4fc700cff4a797dfe5da72875ac4

  • SSDEEP

    3072:hmtcXlsJ7bAmg3G3H+xQykbzdu/QwBfUAEAmjc+RUbY:vQaGexQlbU0AEAmg+mb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5633295549:AAH9lzzrf8Ep6i2K5UISY92DSUSu9k_w37Y/sendMessage?chat_id=5671926480

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1512-68-0x0000000000400000-0x0000000000436000-memory.dmp
    .exe windows x86


    Headers

    Sections