General

  • Target

    4332-133-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    ab3f412b3953646795032dddb36a10ba

  • SHA1

    d321feb62d6f00ec657e4649b6ec37d70310a312

  • SHA256

    27e18460e86b5d72ec575971d820ed1eb8de73bdd4d0a76e91d07421273aa72f

  • SHA512

    86642e4585fcf83bddc3067f7a770efc4f75c4db3bc6befe56f5e7d2ff5f2510e62c3e48a83708124bf90d58539609d2c882a9356f41da68169c912cd1a97451

  • SSDEEP

    12288:jBm3E3HDei3oXA2jCXgXLz/HQOqzjW/N:jBmU3Hq6oXA2jBXHnqzjG

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5515611206:AAEcQSX8hXHOAxSYr8KUdLxGF5eqw4FRXoA/sendMessage?chat_id=1504449137

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4332-133-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections