General

  • Target

    1116-67-0x00000000003E0000-0x0000000000406000-memory.dmp

  • Size

    152KB

  • MD5

    6db85147bbb4235ef5a832b55ae6283f

  • SHA1

    c196e1ef78750d7867859749c975b288bfbca019

  • SHA256

    ecb2a51fff14db545da8f6167a1bffd101fc0cb3ecb0f9d1e27ba6bc4e5ccc64

  • SHA512

    f52f972c2eb135dbfb91deac975ad1c8234595afbac327ba4fdf15f3d0dbc86b70d403e7d4625131244be7149822e6621443bc4784eed17c92571af4e948ace1

  • SSDEEP

    3072:wmtcXlsudJrDKfTSREEPb8YSwBPAFbYOqqu:gL2O5Pb3lUbmN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5402813712:AAG__8vfwqo_1K9XHIpxzTR9T7UW4raysO4/sendMessage?chat_id=5034680713

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1116-67-0x00000000003E0000-0x0000000000406000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections