General

  • Target

    4548-139-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    094780a4f63aa6c7210a494de503b144

  • SHA1

    ef7502e7180417aaa955fc973df0f7dce10c0a5c

  • SHA256

    7a94124d9b2e6932352a0ff66ce46239963d2b584a941f1737bd9172cdaf7038

  • SHA512

    263c3ebafff0463b086be5ff65eeccb963986544e48f05d03c623071b731af8b61bf65c8a672bfe095fb9856a19f84b1ef3f0dd40269bb2910088f77211190fd

  • SSDEEP

    1536:SAgzEJRCRjTZ13uJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFq9eQbb/UUcGSiL:SAgAEzoHj/LDdJwb8UcGSQwBj2iFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4548-139-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections