General

  • Target

    1868-58-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    9ff87666bac490824cdf7a81b6f18e39

  • SHA1

    840af18cca4a15ffee76672a61a87732d2f6c70a

  • SHA256

    7b500c4154348796d49b8903abd1219cb5d7633f724821977f339d1ec9f1fe6f

  • SHA512

    8314b754a96fc7a15f298280b35c9ca65123050db90db73deef082a76dda49ef8418d362da5b7bd7d7eb68eeafad357be7950f40518caa2626db1540d3a207bb

  • SSDEEP

    1536:aOOYzPuJ46h7Teptv+UVrMFez3avQUK6jUbFWH8vhEGpiOWBx:aOOYz2+qeptHz31pbFW0hEAwBx

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1868-58-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections