General

  • Target

    1488-63-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    471bf3ee2f48efee0f3c32e740c34531

  • SHA1

    f31e0a080009f49ca9d91010f319fd475317ad8b

  • SHA256

    60b2ce15b8a967b26f0dde139601ecf9aa86d44d70be2827b307de741abec17a

  • SHA512

    56bdd86d2730544f3efceac1efa7fe2859eec5b5b8a239b52f262b3feff9a564ca6e521244e067114be420b5318b302604b3a841210970812c0502d239e551c2

  • SSDEEP

    12288:+aW3E3HDei3oXA2jCXgXLz/HQOqzjW/N:+jU3Hq6oXA2jBXHnqzjG

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6069996781:AAHmYgsHwRzaV1_6EovGh5IzcjEeVnsIkLk/sendMessage?chat_id=1734299596

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1488-63-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections