General

  • Target

    868-1393-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    52501fbce348b909762fbb3d961c9ce7

  • SHA1

    63c40d0c7872e94b7ed163990185a1e2562163ea

  • SHA256

    5f47af1189c401684aa0a51559f44c7c10226f61795c2cb1eefb3eaea8ec1555

  • SHA512

    09ce6040d2048736c68d6c49867d05958e2f24461aedf09d7f7fe6f23b0a0f2779e9033ccca575c153f6e2e3ae9ef40a3a2b1cd211a04221cc8aef97e25bd0cc

  • SSDEEP

    3072:XOOYz21uqCuQBCcXdEcb7a0V1wBeTTgbY:UzOk/zbO0LTkb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6069803433:AAHmPsyNkh5OacxYIQX6831IlMMaQrlQCBE/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 868-1393-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections