General

  • Target

    1232-63-0x0000000000400000-0x000000000044E000-memory.dmp

  • Size

    312KB

  • MD5

    5a8b4e57cccad544d5140e2b249afa85

  • SHA1

    3b388c8bb203be8d0c73c03766b74abdcc413a63

  • SHA256

    faa476c5d122b8d5e978f5298ca89a12a18be0a2352834ffe777ba43db806c0f

  • SHA512

    d617b9207836659a46ddb147f0cdc7c017fa390baf6facede45e0978298542550aaaaa0a81a43b9750aa7bc563ce60ea3b94afe82a8fbc57a7003c93bd1de619

  • SSDEEP

    1536:HAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFAunqC4r+Fjb/UN:HAgAEkoHj/LDdUO4KFb8heSfTzwBj2

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5808847832:AAEdYxUG27hUO8_66BekAGjLgurijLsuAvQ/sendMessage?chat_id=5922732066

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1232-63-0x0000000000400000-0x000000000044E000-memory.dmp
    .exe windows x86


    Headers

    Sections