General

  • Target

    4608-139-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    a576f2d1956fac89f9326667ed28efd6

  • SHA1

    e7eb36e432f25ecf7001a5c6b0e29916b0b1c93f

  • SHA256

    17a3e3743ac4ec65e8918fdffadd10406ceef6fed0796dde47cc4bc31b4230ae

  • SHA512

    3e446675c9e36fc595ae2e9dab2891a8e445b97e44ecdbe644d2d9f31ac64a0bfc6e3cdac39083e0a68c2876c6adf6c295cea9b887d0380f729207b88f5f3b8e

  • SSDEEP

    3072:0H96cs6v85wcP3Hd6GXgb8gQVwBO5FbY:Rtvo9b4Pnb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4608-139-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections