General

  • Target

    1168-129-0x0000000000340000-0x0000000000366000-memory.dmp

  • Size

    152KB

  • MD5

    493d51cbb450707ba01880f56ec0c572

  • SHA1

    e42a814897ef60eb229f08eec006f183bcd75bf3

  • SHA256

    b6fa32f72442bcd7a0d0c92e15f76a2724c550a6ea773e7eeef8d4ffb1038a87

  • SHA512

    88a9a459243c889a1d374aa16e60c994a196a2f3b5e955a5eef154e1e50532e7a9eb74ae09babb11def4feb2a7ed827aeb9d6bf9dd80fa3ca70e72fbb7bc08c4

  • SSDEEP

    1536:SAgzEJRCRjTZ13uJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFq9eQbb/UUcGSiE:SAgAEzoHj/LDdJwb8UcGSQwBj2iFbYQ

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1168-129-0x0000000000340000-0x0000000000366000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections