General

  • Target

    880-79-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    898bdaf684252ffde1f61a439fa89ade

  • SHA1

    51f0b783dc1ad965cd946e88f90c86f622cda320

  • SHA256

    5f80c6cc9e29f9600ef749a7fe85e8750ab9eb7f4c99e0e351e8a074b6a5912f

  • SHA512

    fd4551495d3786f651e1a9b74ad42921ec9ab5c906d8f53116478cf9eb4495ab1c99c437e2a8f34c7c15e01f08d10b909415e981c157d03942298b49c8adfe72

  • SSDEEP

    3072:wOOYz2xh+Lq9UZVjagibUQs5WwBjRhDbY:pzSOBKblsXRRb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5871428476:AAFDACE8UvJvfXj7XlhB7edBJw5WrnvtTVs/sendMessage?chat_id=5618853041

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 880-79-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows x64


    Headers

    Sections