General

  • Target

    1264-71-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    5c5f4020113d2a8b923eac814d177f02

  • SHA1

    1d22690f41a0f0d3a441af9f6ecb6e58a0629c37

  • SHA256

    4e5d5a4d418e246c68fc1f89b9a960a185663e71ce2b4cba6a569d7b675bc9a0

  • SHA512

    6f72b3f411cf69caaad65c78956c50e215bba80e2637184aec245d39851ea62190c5e2704ceba9d507eb03071ea8664934f6f8a3440224ff910e83815b106f15

  • SSDEEP

    3072:iOOYz25B+Lq9UZV2t/onb7MEtwBjbagbY:DzeuQt/+bQfbjb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6146688727:AAFfNZJ_YPb02ro-oLCz9lGvfxuszNqNXf8/sendMessage?chat_id=5114872101

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1264-71-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections