General

  • Target

    3480-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    b087db15989d2b10729421493e4f2e05

  • SHA1

    0cc40889b4186c1ead8e8cb77e496d8be3bfbdcc

  • SHA256

    4ad8d68b4c2d77927770d17c718af893bbe1161c419794cf335f6169601eac61

  • SHA512

    45776090d717c026f63419dd1a3b24752f4d845545fb442a4796c54f50c05eaa1733c8119e0d21cda4ea0b1efae03dc8cb7f138a7d484bfccf27f76236e7d311

  • SSDEEP

    1536:hmtcOks6s+racPiaE3HHCWuxnXX8d80b/U03ppiOWB1CF0Kcl:hmtcXlsbcPiaE3Hr4XX8pb8QwB1CFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5484820495:AAGEjy8dT72vJZImmHLmeh3onMuG9LLRD5A/sendMessage?chat_id=5101327412

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 3480-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections