General

  • Target

    1240-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    47a7bb82a8fb9d565a11e55732697d8b

  • SHA1

    2b4bad36662d04c1869b3992e0eb288a97766e37

  • SHA256

    1869a07c09790761772ab1466d9579d775e727a57d4c716a11dd58fdebd2dd82

  • SHA512

    16fd3c77242c755098548fd0293e45667bb48b2ebb80219ca29c059ec69ef5cdbf5f8d803b5911167b3bccdadc1ddbcbc2b95cba421dee550a589a04d893ba0e

  • SSDEEP

    1536:SUmtcOks6s+sSyJrDKfTvGy+quSCRYb/UrHx7s2piOWBP:ZmtcXls3dJrDKfT+9QEYb8VgwwBP

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5150567231:AAH_GkbbEQ0uH8Xg1qaXPHVZM4SibbJ0lJ8/sendMessage?chat_id=5395855805

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1240-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections