General

  • Target

    3056-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    560820229135be9eac54095d00d6afe1

  • SHA1

    33dc728c0f427229dc273bcbb94783d579f7671e

  • SHA256

    53c61dd3ce4f5ceb5c3b2a2892d25809f9d39d863c193f00f15b05267f3eb472

  • SHA512

    7a2065859323d02d10d2b1440dedceb25b24dcd23456dda00ada604c910ccea928b7a0ec0d80d6dbcbf843bef3f32492c2ac7c998c821e0a5cc051d03d977b2b

  • SSDEEP

    1536:yOOYzPuJnDD+Ob86+stW+AMF9mBj+S4b/zztb83jTrpiOWBWjT:yOOYz212p6+stWhK3b7ZcFwBWjT

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6178167079:AAF89EAU6cjADoO39gVxivh4p16vKLDEJ0g/sendMessage?chat_id=2015447474

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3056-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections