General

  • Target

    2432-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    e854c1c54a525d6980123cf705fb4ba7

  • SHA1

    3e6c130e316a45df0aa9485a66050cee24363da7

  • SHA256

    5156f21fa129f113022da8f61ec5fac0f5d6f52c9d88fc5b089791a9199a037d

  • SHA512

    342283ee16206fb5239525d1501f83bdef08ca8c452263ebb81ccac1274ae8c61e8ced3877ca3091d5b4c533e2856aa2c8afd2a262844bcdfd708cea2e73e3fb

  • SSDEEP

    3072:uzRJAs3QPzWJ3H6gfzO4Nb8NRwBl2FbY:slN7Jbnyb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2432-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections