General

  • Target

    1412-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    a6a861e96a85f1c2ea22b2e590c46e71

  • SHA1

    48badd4a9677e06fbad92f2f7702d1669bf5731b

  • SHA256

    3010e060491425714c386253cf8e6550daec35e77e456d7fb985d013c017614e

  • SHA512

    cd3ad23c90dbb053a995d4543afbc44e0a37bedd07e9434163c91f1cad6acea3c16003244d8bb5e9257af72efee980509db4f42916c05675e32c5646bbc62aa0

  • SSDEEP

    1536:zAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFA0DUGLGQCGWGbX:zAgAEkoHj/LDdfDsAWGb8o/jrwBj2

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6212049635:AAGd0rFfIhmVr7CeKXSNpEZfBPLtPgGA1PM/sendMessage?chat_id=1762700553

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1412-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections