General

  • Target

    580-64-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    a317fba13a61e44950532feec66a7151

  • SHA1

    2c5d808ea6b717b0536c212a5f526e101d70c238

  • SHA256

    700a1fe2fca6c6221a4e01abf8f41ac23d1bd936b89df0c1f5fdb075a5e999e0

  • SHA512

    c2a8c5c6a472396da31b6e591b9c3b0a67f51778d61894331972f244c8822f91f58b8fe6dfa7f2c147cf443d31eb7dfdcb9ebb6b131c33518760afadecaa8d1d

  • SSDEEP

    1536:EFlAi3bCo1sI4SSGP0NZu0eLTxJjEf3Es34A6b/UamrswncPpiOWBlxF0Kcl:EFlAi/s+PkZu0eLTC4Bb8zchwBlxFbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6072666903:AAGlS5SjiwZOiMgKvOlUpt3R5EGSQDbbP0M/sendMessage?chat_id=6179718104

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 580-64-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections