General

  • Target

    1720-72-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    efb76a480fad5b6fbd9ad7dae9f1dcd6

  • SHA1

    c872ff78e996507ec84ff3dccf984db52a0c13e8

  • SHA256

    82aea2fbb8871ffafaef303764e537162f93a1b63b1780d38139d52c35b5a79f

  • SHA512

    138c52dc27465e6cdedf4296e98052bed17a9b28316813c64660c91e2b2451318511b80041240cbb1009d048b4e010e57c7ad63246a93bc76d59b7489ff55a31

  • SSDEEP

    3072:oFlAi/s+PkZu0eLT3G8Qlh38b8aKwBl9FbY:UvpfGNlx8bfjb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1720-72-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections