General

  • Target

    944-70-0x0000000000400000-0x000000000047C000-memory.dmp

  • Size

    496KB

  • MD5

    293204702f810d6e74c2ac2884b969f3

  • SHA1

    9cb10dc07b8456e4fd01bfdd936a8ca90be5c748

  • SHA256

    376e6e157559a67c7f42a47cc406d38b2dfb5ea7ded55adf53f099906da87e05

  • SHA512

    c5301d738d7be8c3c564153fc8a80e93bf54a48339f42e0303709b2b5194c0d0df90396e3dd2647d5c3d820ce6099b50a3bdfce1a5493e228b0e4359706b1cc7

  • SSDEEP

    12288:W+V3E3HDei3oXA2jCXgXLz/HQOqzjW/Ny:WyU3Hq6oXA2jBXHnqzjGy

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6171002754:AAFU7K4C1WFnRTsXSuDMCz5Z8GERCR1Eo8I/sendMessage?chat_id=5996581691

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 944-70-0x0000000000400000-0x000000000047C000-memory.dmp
    .exe windows x86


    Headers

    Sections