General

  • Target

    1732-64-0x0000000000400000-0x0000000000472000-memory.dmp

  • Size

    456KB

  • MD5

    738ed2a994dfb2c355475574a77edd3b

  • SHA1

    4e13f164d450881afaa1d1493dc10d5f7512633a

  • SHA256

    d6fe57b1365088e8d4898b44a269883f01397fdfdcaa47555ba508f8ef7121f2

  • SHA512

    4eeecdfd162746322b7ccca38a963810ee41640e1bf9c2330cf254a885174bae6075647359bbb15b39cbea4ff53cc01ace4f369e4f2d7a71e115008de307f95e

  • SSDEEP

    1536:omtcOks6s+sSyJrDKfTvZP+peUSVyYFb/Uj4camIkpiOWBP:omtcXls3dJrDKfTR1Fb8jdamVwBP

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5634627589:AAFwx4pQ8MD3ucRRs1LDHawKlR98KkWR2qM/sendMessage?chat_id=5798274961

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1732-64-0x0000000000400000-0x0000000000472000-memory.dmp
    .exe windows x86


    Headers

    Sections