General

  • Target

    3992-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    ac077435947c2f7e190fa1781fd95488

  • SHA1

    64f92b44f3b8572edfff7eae3044c9a7d45379df

  • SHA256

    afe75e5e3c6ba386acd005fb7b0a6e38ef9028d84e2f51a0373fb477ea279623

  • SHA512

    4afd7306cd4dcb3db9631c5276f98f7575f98dfc3fb0999518fb7f3c0ee64d987d8abedaa421b65353f4231c7dffb4ec1431703dc65be27789634237ef19f64f

  • SSDEEP

    1536:qAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFJZ2KgLvugb/UKp:qAgAEkoHj/LDdRrgb8b6HwBj2aFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5478319803:AAHq9LkDUFBRvjOub4YfRlPURZxM59_BVnc/sendMessage?chat_id=5516439768

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 3992-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections