General

  • Target

    572-62-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    047c381bd96e43385518ebdb58f98d1f

  • SHA1

    7dc9147bd8f4199b1f1467a446751ce29cb676f6

  • SHA256

    ca877ed4d3d078925d56388354adce7adf505f9c1f3a6aff2471e019396df197

  • SHA512

    896fc4b3c05b15554869492758e16833a13d75f206dfab343bc5eccc30d4f78d80856c10c1c5eba5573edc9f9afe976fb61da313bd0e90a19c99753443bf6bf3

  • SSDEEP

    3072:qOOYz2VWPIdSd6blOovGb7RGvO8CwBjb:7zCJZO5bqBb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6227397160:AAE8eokQvX0utxDOasNZJIPONY8a60Rkte8/sendMessage?chat_id=5664284422

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 572-62-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections