General

  • Target

    1204-63-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    c90c5187e574a00277460e9b7d55499a

  • SHA1

    9ee587bcb12be06d49ab30a56cca08151eea27f2

  • SHA256

    17b6d2c5a6e0f14fc452f0b92f8593f40d7ae9ac6258b59ec73966154618e6b4

  • SHA512

    89ac9c4926d3d03a484b8d17a5b5176b315839f4b4edfe2ba6947f97a50f9cf0e51581d2df3ca951000b2101256f2ad44280a2448820288f0804ea2e33a31b46

  • SSDEEP

    12288:5+V3E3HDei3oXA2jCXgXLz/HQOqzjW/NzYj:5yU3Hq6oXA2jBXHnqzjGzYj

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6069996781:AAHmYgsHwRzaV1_6EovGh5IzcjEeVnsIkLk/sendMessage?chat_id=1734299596

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1204-63-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections