General

  • Target

    748-68-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    0ab6215a38b224cffe00c6738c175aa0

  • SHA1

    906c346f3313ec0385ad996fbf256acfaf49343b

  • SHA256

    7c5ff82a92cd9ecd481c98d0c4d73c7af2121e6ac9c60f60a03c7382c3d14b23

  • SHA512

    1b36b2f01b6c28e34bc17f99bd8ddc07ce5c797ff82d41ef56fa72c4e143e575c3bda0d6885ff7a46f679b46942ddaf6db7deae48dcc5c81ed7692da088cf50e

  • SSDEEP

    1536:AFlAi3bCo1sI4SSGP0NZu0eLTxJsdX4+VZiqoNNb/UGrdispiOWBl:AFlAi/s+PkZu0eLTARIrb8cwBl

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5412042498:AAH4OVSAlB-9yvO0MxObTPVF8mPej6Ln4M4/sendMessage?chat_id=5573520537

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 748-68-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections