General

  • Target

    772-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    da3fd4dd2d017ff0c98989863344de10

  • SHA1

    1f2c40f2e85a24946691be7437bd270536a99107

  • SHA256

    b684bb2a433650547b0446eec171989c234d3639b10131515ca96cd4f9f1be85

  • SHA512

    68b62ad6c1ca233979c7d076829ac93df5d6d835e8b9efd1b1e5fb6160fcfb0765eb372bc6a4c7b890fe4186d93339c2543ca8699bf43e73488bca4c1c396b64

  • SSDEEP

    3072:uAgAEkoHj/LDdDAOxVKb8o13SbwBj2WFbY:TxWC7bD92Sb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6294963808:AAHsAyiV20w0jAQZxovKntkKJLihCbqiKkE/sendMessage?chat_id=5675280301

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 772-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections