General

  • Target

    2012-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    a6150412d40fafb76bd9796529ec90c4

  • SHA1

    8c29ed2bfa9bdae85b14f82dd6d46e2767502441

  • SHA256

    ad6259c70f37dec075daf48ef1ad585af04e3cb88141a395a5cae335cfda0422

  • SHA512

    e224c29c4ac26a562f3570d0c29d4bdc40fd4c41323905603ecb7f6875097c73a36343afd85eafea7f08cc2f874d8ba9093211ef2e2a6913a1dac28ea7178e39

  • SSDEEP

    1536:tAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFQc5N4RROhkdlbx:tAgAEkoHj/LDd2ROQb8cpUGwBj2

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 2012-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections