General

  • Target

    1528-1463-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    91867409267a7083371816138125336f

  • SHA1

    3df76c7d04910631d5fed7c283bd132dc2307103

  • SHA256

    41fe436f5490f3817c0a118c8ff2f0fb3212d9896a684fa5ebb818c24bd9f420

  • SHA512

    24915e9d28ffe9b4176c180838159994bf89004b78fd59c4ab62da5a41668cfa7cad3421c0bc890881f261dcc300a29539a42b96db825b9505534c9045d9f162

  • SSDEEP

    3072:yOOYz2l2PIdSd6bRMqXqbUTAARwBjRIDbY:zz+px6bFRab

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6259718683:AAGI4VUIRIlV-kSdr6rKJI_h5erKbYDAQyY/sendMessage?chat_id=5716598986

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1528-1463-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows x64


    Headers

    Sections