General

  • Target

    1060-60-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    774b2bb86e0ea65ebbcfcaf9e93916b0

  • SHA1

    f55830996e974a1c9446c24eda4dffdeb580899c

  • SHA256

    a8f2bbc098130c1ccbc49d3eab133569b28ab799427067c7a9c8d206fc8abc77

  • SHA512

    f0129039be3a7e2e855090555c1dd18e028e5ff1e2fa2e3d6d2c09480a13e241354e257e46f58c964621f32783b4337d479f4829512f91f527b7f5850d58b95b

  • SSDEEP

    3072:ZOOYz2+WPIdSd6b2EJ9b7gVDwBjbQgbY:mzJJh7b8gb5b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5977159085:AAGkppBaRI1C-uOkQ7XsAFcaTUm_2GPrYFM/sendMessage?chat_id=6082978649

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1060-60-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections