General

  • Target

    644-66-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    1b933cc3e271ac27d02f7ed1ad2f3df8

  • SHA1

    2499eeb34b3487f7ba4f8e06bb76d9b27d3d06c1

  • SHA256

    5108a132336080d20d163c9e0c7ee01548685f31cf44bdeb7e354202524cb3c6

  • SHA512

    ad178ebab293ed13c37e0b7d659b53a054cbd3b5bcfa0503b86a9e9fdc7a2afd7ef78b79822d21f568d3c151d7d9374ae1f4b6381b9f726388ebf7db3dabc788

  • SSDEEP

    3072:yOOYz28fkhDyYdS348jb7P5icDwBOT9gbY:zz/9YkIAbb5iETeb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5977159085:AAGkppBaRI1C-uOkQ7XsAFcaTUm_2GPrYFM/sendMessage?chat_id=6082978649

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 644-66-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections