General

  • Target

    4024-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2a3418e1b9330a5bbd3e5f88d7c695d5

  • SHA1

    d15dcc0c8eee096c1cc4f55d5420521e80854320

  • SHA256

    fb5f8ac7af2df330a00b50b9a7e1a97853211d76be1d3c9947fd3407002a0b47

  • SHA512

    16b63880a676c297634509941f3474a8b0e1649c7b2b6d5438a3d6f8116107e82ce9593bec35154e5a90a9b27e064f2867c848d9b96e368ec6d4b49fd0d85daf

  • SSDEEP

    3072:1AgAEcCv/IgOYrvQ/CS0Rb8D0dGwBWjOPFbY:eFyI697RbFqO9b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6088403113:AAGbasJAZS1yXzT5Hv6KJBlt80Z5QJZiq8Y/sendMessage?chat_id=6128502729

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 4024-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections