General

  • Target

    1672-61-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    3c1815f7fea104aa4999d87dbe917e36

  • SHA1

    0c75c44ea5b93d9a0f7e6c19e6f4b22415f490dc

  • SHA256

    0f22dc8005a9a2a4ce1e8674b80705e70aa50f781461bb933320c51cff234dd0

  • SHA512

    d7c0c0043f2ebe6e961ca242096bd19ad5f9fa9194f51e3c0f836321e0e8a687714ec60e376e8937be6442b6fb2b9e310274bb823741068cc08baec7310e3291

  • SSDEEP

    12288:NaW3E3HDei3oXA2jCXgXLz/HQOqzjW/NgV:NjU3Hq6oXA2jBXHnqzjGgV

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5455879159:AAEEslA21OkiC675k778sJZDVmWZA0hIPJc/sendMessage?chat_id=5806341614

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1672-61-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections