General

  • Target

    980-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    657bd525304a10c6054fc971fd36c64f

  • SHA1

    00b8afc7abfc6dfdfeee4af627d4862794f033be

  • SHA256

    0f53919c0163bb2c1e908ca10b57fd863da7c65b46a3d88dceb00570c9a13196

  • SHA512

    1f25a69c64ab0c3363715416b8430478e2971d1e1bc7fd24f2f8c1816053ee72be4cca1b34e0736cde905e00b382f8191da1255dbdd841f928009d5698661ad1

  • SSDEEP

    3072:EFlAi/s+PkZu0eLTYwjRNnQxe0KSb8AwBlxFbY:QvplNnQxe0KSbSvb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5990689485:AAF2-uAQqkGmyMf-HkQ_5G1q8B9Ce_oT6o0/sendMessage?chat_id=5726609491

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 980-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections