General

  • Target

    1240-65-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    32b52c30acf21a6620688def51065b71

  • SHA1

    1e96bd7b1ae809c246fc1491fab7559ecff5c939

  • SHA256

    f5ca1da02f709c95450b1a2506d8ae94cf3b96557a02d58edf2e15299190aba0

  • SHA512

    9a89fc95ab4031c242aefc56b5bb327478a1d5d641b6d4551b722af1c5992f10053097438bfb06f894e38e01c44c5d018249aeefbcb7b6cfb1b72a47eac00927

  • SSDEEP

    3072:0H96cs6v85wcP3Hd6GXgb8gQVwBO5FbY:Rtvo9b4Pnb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1240-65-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections