General

  • Target

    1756-75-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    ae78d9e227d023537d919d775ff7bc32

  • SHA1

    85b29c4cd0275b7b4ea558ca56ae0cb41c2c07d1

  • SHA256

    817549fc3c8393bd9fa3efd82d6e9f17d5e3f71ba7f7493f4960fe0d3110569c

  • SHA512

    3e979270b506bad2d567c8ae91cd72472702b78596206c219c26f65c81c9ac396cbb0a896d198ee14f2b1d932027576e331392ac22db00be80ba6fd88a222dc8

  • SSDEEP

    3072:GOOYz2CB+Lq9Lqu+JEV+b7RdS8k+wBwT:nzVsRbVd5T

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6029559841:AAEqr8_NCfqapJgAzw8PoPbqoCosnsk1VO0/sendMessage?chat_id=6033043077

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1756-75-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections