General

  • Target

    928-135-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    68e024e341fc6cf0f02a7c53c8f68b64

  • SHA1

    17d05fa22cb2b61a249bf634c024884fd083fc74

  • SHA256

    2816ac8fae919db13ca460512a1704e7f15909b8bcd9f485fd15f5ad8ade8cfb

  • SHA512

    1b3eba553c64ce11996f4874851dfcc9ba5de4947e30fbadf49415f27f75d4f481891fe6f653242bc35213152f0501a0f5a7679351d1d194401fe2fd8ca9dcb7

  • SSDEEP

    3072:LOOYz25B+Lq9UZV6HEi/Vb7UtACrwBjbSgbY:ozeuIHddbVnbbb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6138608294:AAHnENUN_3lvSHUAiA3akq59FAJ3uRd0nIc/sendMessage?chat_id=6095723753

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 928-135-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections