General

  • Target

    1916-95-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    94e0e83b2e7bbe650830e4492552b910

  • SHA1

    7436e981536679b4606598ff2838cd72e565c8cb

  • SHA256

    eb7dd61fb9010ac356ad2d7aa3c256b857edeadccf70d7e678d3ca4a712a2ac1

  • SHA512

    ffe591dbe602a6da2aba12e208eb41fec4992f997785628ebf1aafe405f75192984f0f94e49959db007d1903f8fc3c417854f7cacb976e044681c3ea01c04f6f

  • SSDEEP

    1536:8X5Qvues/3U9mP4wOR3HqKBDBVZo6GsBMoz2b/U/DSPGEc38vpiOWBh:8X5QNs/LP4wOR3Hb8syg2b8rhUwBh

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1916-95-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections