General

  • Target

    1420-71-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    0c21fd1f5375f93e11c9fdd4d3522854

  • SHA1

    904311503c7efbb19faac39ccbe1fd8baf4e2721

  • SHA256

    c0989d3464f99c3da0656a706b7af992307f021217dab2c9c4d8d88229568406

  • SHA512

    c2c7d4f4e9d2a9e086e4a9c37478a54754372138765f11597626fb92839dedaf28dc5c6b6975bf37383abae03e27914cab8c1c0d956da033e4bd28fdaedf0b21

  • SSDEEP

    1536:AFlAi3bCo1sI4SSGP0NZu0eLTxJsdX4+VZiqoNNb/UGrdispiOWBl1F0Kcl:AFlAi/s+PkZu0eLTARIrb8cwBl1FbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5412042498:AAH4OVSAlB-9yvO0MxObTPVF8mPej6Ln4M4/sendMessage?chat_id=5573520537

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1420-71-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections