General

  • Target

    616-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5af6ae5ed6301e6a44435ff42b3f68dc

  • SHA1

    38dac430cfecb7dedfcf8fd295b5eae25450e3cb

  • SHA256

    4d3ee6f52c582e1f897174feffa8d5a73f09ae5a4f0b845374f5bf6684ce9a82

  • SHA512

    19795639d410a82726699c941f14cc0fbbcef7123b9d361141177b36c85de5a051b6b465381d85a0dc34013e69710ddce34fa9e75acd417acc1e2a4694603eec

  • SSDEEP

    1536:IFlAi3bCo1sI4SSGP0NZu0eLTxJuaQr2A2UGrbAFJQKb/UaoXhpiOWBl:IFlAi/s+PkZu0eLTqFbGreiKb8a6wBl

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6110227557:AAFnYhOxxoDPNmQNy-wS6l5BpCF0bpHLbr8/sendMessage?chat_id=5836408145

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 616-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections