General

  • Target

    4212-143-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    20fbc64d99520b3adbb808601454f39c

  • SHA1

    237cfc62f4edda4e333a1a9e07aca0f28d8bbfc0

  • SHA256

    5c75e985e7f7d6d4cdb8f9e14fe69c28654f3335022d52310867fbceb073a330

  • SHA512

    bd20c53dbc29c9f784d4c249ae5fb6eb95ef769cb298eb637a39ebb8b42e3199582e1fd59a5dad07c388d961c23e5018431bfca88e471c2240509356b4a95ff6

  • SSDEEP

    3072:sMqqaM97eOTPiK3Druiik/XbKjPDPAgAEzoHj/LDdJwb8UcGSQwBj2iFbY6xC:WCteODDTzK3kaWAbQ2Gb

Score
10/10

Malware Config

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 4212-143-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections