General

  • Target

    4768-134-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    bd927de90c0afc1054cd03f44f3f61db

  • SHA1

    90b855c4b4bcf2e95c7dc31d94c1eeb817efd1b2

  • SHA256

    6dc84c635d740d5e1c2605ce710d37bc6ce52305ebbd42572af91d349b391657

  • SHA512

    5ec4aec69553eb7951a7120995f3cf3e3487f83b9c38581b100f1e1b65ab4023bb5730b1830710d88e6a53a23e3b4bc9222b0b229f90a7a580e8969205cafb7f

  • SSDEEP

    1536:xOAgzEJRCRjTZ1j4Re6Lt/HgDJjgdMb17QdsWMFVZ5vdb/Uik63jwpiOWB2vOgF0:8AgAE/4HwL17Qdi/Vb8VkiwBOOgFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6180860165:AAH5meoxRqYOnd7z0M_zkiqQ7pmOf_hbrUY/sendMessage?chat_id=6077046490

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4768-134-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections