General

  • Target

    1396-66-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    d99cf7f586efe356b30384c6d5e957f9

  • SHA1

    8bfef9b20e98db89948e5f9f13fbab8b31033ca2

  • SHA256

    8153ee6ea49d641cf3d61c46182f3646a67bae251d37a1267506283b4d329c11

  • SHA512

    8ea6b1a994b137ab7a7845463887751ed7d3fa6b78fbb35ba543f6c18cdfc555e0d800885fee12626af068b4f46eaac8872b20f9c8dce09a19e0d8e1c31e7cea

  • SSDEEP

    1536:smtcOks6s+rWc78k23HyaOXd4+Lb/UebD6q9upiOWBz:smtcXlsbc78k23HmX9b8uV4wBz

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5675333953:AAEs_VtCPxgjELt0C8Syxvno7W0xxp87g74/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1396-66-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections