General

  • Target

    1772-65-0x00000000002C0000-0x00000000002E6000-memory.dmp

  • Size

    152KB

  • MD5

    2cd4f58af2d8749b1ce0bfd0b1c9d103

  • SHA1

    28fa657f952bcc58b527077c23bb19535860c562

  • SHA256

    6825a6a716ca9407a7d1011181a4405bd8919701ba15de8736607feffe59890d

  • SHA512

    cd57a8b0f465b66164177b33eaec1327b259b275fe2e27790fb4fdb29bc234844312f87c06211b37ec1ed190e0b3360c70f4dab65ccf8d3de111f2a820e4b609

  • SSDEEP

    3072:lAgAEcCv/IgOYrvQovxAb80dY6dTuwBWjO/FbY:OFyI65xAbvd1MOtb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6160036640:AAHqrAdmG4_GQkcLvxoups3k8WSEUC34w1g/sendMessage?chat_id=2052461776

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1772-65-0x00000000002C0000-0x00000000002E6000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections