General

  • Target

    1620-70-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    01ba873a851b059087af3f7f2873a01b

  • SHA1

    eb36197cd43613dc7e2bad69b162f58818e97b2b

  • SHA256

    886f514a93aff157920bd8d6df869381ce307860dc3a05bad0e98bf5bfcbe586

  • SHA512

    156a27f95ca9b90fa9e2c5d917cac5f940d16dfbfb4553ec077ce05c8edf4b07aafcb47b882ddc32688ea99f2fecb63b35afa5e6b7fe45d15dc8da9b5fe4377c

  • SSDEEP

    3072:HAgAEkoHj/LDdhqU/bei8m5b81Xg0wBj2:sxWlfbE42

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6007089764:AAFD9by3UqW3VYmVw-YRcKrJ6hMzB1mxNeA/sendMessage?chat_id=1258525953

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family

Files

  • 1620-70-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections