General

  • Target

    1268-79-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    448edee0f8f852627f7262d8669cb35f

  • SHA1

    16f860cca36430becc7ff54811a36fe16dd45c8f

  • SHA256

    145f94c525000d83d91c2a939ed9aefca8213aae6f4df61d537417cc42382c74

  • SHA512

    d57848e33a2c851b7974a85d3651c97c636cbaee0caebc254f0f3bbb69383b2b6d5a0dccdc75167f7258c71883ca4b99b11468481da437b2d3c23dbc12426596

  • SSDEEP

    3072:uzRJAs3QPzWJ3H6gfzO4Nb8NRwBl2FbY:slN7Jbnyb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1268-79-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections