General

  • Target

    564-61-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    cc04878f6e6c68d310158015d9bc9f3e

  • SHA1

    b5b8b0133518dec5c1ab91fe5fe6fb67f6f44bef

  • SHA256

    c1fbf4802dec49bd603c939246e0074d95a9bbcb7775eef43cf77183ead57379

  • SHA512

    72a8c204f6192ea20d7b1fe9b828ea41a0f77392bc702fcf45b86d1e6c5c2ff2aaa8c2ee86e1504d09bd9303406838ae9f0fb44a9b42826924f25b5aedcfe40d

  • SSDEEP

    1536:GAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFIgqz6dxLNP5b/g:GAgAEkoHj/LDdsmLNP5b824wBj2

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5455879159:AAEEslA21OkiC675k778sJZDVmWZA0hIPJc/sendMessage?chat_id=5806341614

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 564-61-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections