General

  • Target

    528-65-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    65241e4fa5a5473e85694dc890883472

  • SHA1

    d23abaf970c6f1e5608b5784409afe06b70dbed5

  • SHA256

    56c142674c928b3ebf55b785660e679120637caab6ef03e7089989c9742d1445

  • SHA512

    a7522dd9b66931a25195dbf7fa29b1079d58d95b9d1cf2e203f5b580a81ded3e1ff867171cbed69c14e9c34eea6e0a29e5e007470591a1b42f5b731fd219a7ab

  • SSDEEP

    3072:WBGybM97hOQ/iK2jrOyipY/XbKjv06hryR6UGnK6oZJ+d2b7xyOwBIN+gbYqt:hDthOzj8YzKQfjN62bzNfb

Score
10/10

Malware Config

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 528-65-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections