General

  • Target

    2456-66-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    c393e06a34ed700aade9a3c5636bfc99

  • SHA1

    ade34c6e08f64cb2dab8032fd597d595dc065beb

  • SHA256

    97d1f90ee159c92865547ccb125cb74ae4d49644f2158af0d88bcc8b31a8f324

  • SHA512

    e25580520c196118d1fe52fde21d7a4aa517460c32749249b17b40e300e9a9c64fd1380071f1c7ce91e055def791d804aa068e133b6e6e70882e37f505a217d6

  • SSDEEP

    1536:FOOYzPuJEGipAFuDgutB6+sEWE2H8kc4MFM13J3mb/zNJTYkpu3piOWBnTu:FOOYz2CBwggutBM3pmb7Ju5wBnTu

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6076917727:AAGbsf1c44EC0CR26JUQPsvvVqX6Ki5kb9k/sendMessage?chat_id=6282564049

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2456-66-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections