General

  • Target

    1428-69-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    b50874aa54b822d6e5c952041725ae7f

  • SHA1

    abbcf0afaf9d350c450a97d77b7a2d20ecc6ff80

  • SHA256

    cfbca7aee43903910813ed335d8977561d5eed5dadb6942a9fe662df77d2765f

  • SHA512

    3e6ee5ef6573960e211fea9784f5be16622a4c31cff6751b0c7dad15dea23a36fdc2c074eb2f55d7c0501a799a0d878920766d7abb9bbfa58acdc8282cca1958

  • SSDEEP

    3072:IFlAi/s+PkZu0eLTvyg+jpjke4LFVYOb8iokC6RwBldFbY:0vp3yTjpjke4vbVf0Db

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5793325124:AAGHzRsq2tvLBf23l8pkEofcJjw4AQXsgAQ/sendMessage?chat_id=2086616067

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1428-69-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections