General

  • Target

    1280-65-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    b7e22475ec81b6ef00331e4db62fb8c5

  • SHA1

    8399886f5c510fe4b29d31f65a26468ee91d51af

  • SHA256

    0fd159f0387689ea9b010c114b812e66f8be813440225c3349e46c61f6a4975f

  • SHA512

    805da254c7c03b898333fecafd3f00962b46c0d23d9e942a06c513e99c6d3f2b075f44e0dc15aa2ae30f24eccb6735561e2d0bdd19b4c0fa4c62bf76c7f9f6f2

  • SSDEEP

    3072:PAgAEzoHj/LDd1nqDeG9b8moFryqwBj2:kaWShb5oFrA2

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6068753342:AAEVQdCDynehDgKDkVfmYAGa3eAC1kTDxe0/sendMessage?chat_id=5830834219

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1280-65-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections