General

  • Target

    1404-69-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    60b453753cbb06deb9f2ed204e817a59

  • SHA1

    0a4e5c19cae8405503095282b6a4b7252c2f7f62

  • SHA256

    7ac53194725bed227c48570d33777f56f833aef06f4f4255cff03a322b8fa6bb

  • SHA512

    6f4ab9adeee33aac85bf6d232bed2a628dd991cc3ccfdf64cff10cb3f1361b54f4a33b880582657ed3bf40a7c9b30bcbeace30a75701e83d314b62b004d5e71f

  • SSDEEP

    3072:tOOYz2CBwggutBJjOSqb7Ih6hBXwBnTu:qzV3bNqbwkcTu

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6286794299:AAFoOBbC33diFxmvBnHwbQi1CQh8FcdddPw/sendMessage?chat_id=1696657848

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1404-69-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections