General

  • Target

    1232-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    7ffce389b4aadb015776c044459240cd

  • SHA1

    31e36eb3542a70faaa7a881265a43efe3c6ca393

  • SHA256

    e326e2daba10ddbe5cfe1dfcb915aa13574abf4c2ebfb1d6b241a4a2d1a7d7ce

  • SHA512

    96c7d685593e04732b069cf0120508c8c7adac6321eb57e6f2699d10e7ff8234e3735a2f4db25da55389ef197ec5fe8e058a4da1da0872766dbda618ec6dcf5e

  • SSDEEP

    1536:lFlAi3bCo1sI4SSGP0NZu0eLTxJUVHi7b/Ub61dnpiOWBl:lFlAi/s+PkZu0eLTH7b8uNwBl

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5118774259:AAG7N5Yo0uMkNCHE-nnyXIcu_xpZksuGTfY/sendMessage?chat_id=2076143622

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1232-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections