General

  • Target

    2824-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2153bcf0d6689ec839ebde4b505790fd

  • SHA1

    feae33b895f5c0a54ce9461c02343048d0e9b2f9

  • SHA256

    18860f4fbc8781653fea9b4c582b43b82b9f029384e64f7790620d9196ebc539

  • SHA512

    20b3a332a82aec9c3c6d9989b4e34e10de8d0ccfced814af5813995e8f62ccbd415534da71e0cdf88b1f2e76333b245aaed58294c2a5fff36dae061680078fa6

  • SSDEEP

    1536:aAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MF4rhSJb/UCEDU4i:aAgAEkoHj/LDdjJb8CEDlMwBj2qFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU/sendMessage?chat_id=5350445922

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2824-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections