General

  • Target

    368-66-0x00000000003E0000-0x0000000000406000-memory.dmp

  • Size

    152KB

  • MD5

    39592e2d4bf15dd633d0290ee12c542c

  • SHA1

    a8313c27b5fc5846e7f6491edab9acde0532bfab

  • SHA256

    7e8dfb6e86af9555f323a24d94d35333387dcb3ce0cc86625803f3c3d82c6ce6

  • SHA512

    1e754bb2d1d5fe26331a165288ec9e9fc7aac3677508690e1d2bd6e56539a8c59cdaf03e11eb36521cd8709823f2bd0f33eff7fa169c684f76289db96f4c1d06

  • SSDEEP

    3072:lAgAEcCv/IgOYrvQ6pGNF5b8Q4wwBWjO/FbYYqqu:OFyI69pkF5bVOtbUN

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6155153237:AAHwniNOLh5IeMqe3WWu52NIjrXAphPX4U4/sendMessage?chat_id=5463149861

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 368-66-0x00000000003E0000-0x0000000000406000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections