General

  • Target

    696-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    f48a6992ba93dfd462624bfd6f5bce62

  • SHA1

    10dd90fdbe241f17f0d20de5465394df77233bf3

  • SHA256

    f05fa461a63e4ecd6e763a937b94b734e5765574742307a1509335ef8fff0d72

  • SHA512

    88d9b2e9ca1dced76ce204273485e64d0cef23e6d62d29e76b1082250544d9cf52059886fdabb60b2bac7a66eb71bf924df65fc8f2fe69b1874b53f5ca6fc4c6

  • SSDEEP

    1536:hAgzEJRCRjTZ1ouJjuBYHj0I+vBUFrlYYLDkrwsDQau8IzR+MFVnVFF3RMWFyobp:hAgAEkoHj/LDdfDRlb8py1VwBj26FbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 696-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections