General

  • Target

    4568-146-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    062fbaae943c45ccf4926562061877c2

  • SHA1

    2c90f2ebdaf243f2795d9951a34dccc28108fc43

  • SHA256

    20bd17ea3e67ef546a9d77c571478c9e1b4f3c3569ef769651bb077fa63e67e4

  • SHA512

    de3d4cfdb3f717fe1acb4e7ab7a92f025a6d9567c7347eff2fb2a88c3ff7a0f5ad7e44788791c91e209b02392bf448553fd038f9ccd94a097d964bcb5d10f205

  • SSDEEP

    3072:UOOYz2p4n6utJdTZ8Xb7xFctwBQbDgbY:tzaqJVsbcbUb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6146688727:AAFfNZJ_YPb02ro-oLCz9lGvfxuszNqNXf8/sendMessage?chat_id=5114872101

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4568-146-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections