General

  • Target

    3656-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5ed88a8381e60a48c200f42b9f25454b

  • SHA1

    d1448d91c7a38f09602f7bb2bb454d02d78840ac

  • SHA256

    4aa655fb4173c0a480c8c26fabe7c5c012d506aa3bc33c5b0e53fcec57b002da

  • SHA512

    260f34069132e3bd30b32ec288e5eeac67bc74da2f0eeaa46d0d554be2a32f405e0a7e63647f6a8aaabb24cb9eeccebf1480fb67625e0ba220938e15ebc0015e

  • SSDEEP

    3072:6AgAEkoHj/LDdKeaz0Akb8fw2dEDwBj2WFbY:HxWses0RbbA92Sb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5818680343:AAGVJsfIHcopySiifMCdAaFCv-ICp2_Yo_M/sendMessage?chat_id=5765702254

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3656-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections