General

  • Target

    968-63-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    23cc19e7a83f043ef98f43d23b00f692

  • SHA1

    93876083f93d4d3a96779c7f6fe2275430a504c3

  • SHA256

    87369dbe185fe6071698ac60b56311c75fec179603a66150ba32716d35272c28

  • SHA512

    aa6853fb25352bf6ac41d27a0a1bf3e30918b7e1593168a0798c8b98b48b475a48675b73817698b76c3fa199cc639c6b2d838528695e6d5c763fac0271d42b53

  • SSDEEP

    3072:nOOYz25B+Lq9UZVE+oPU1Ob7PtI8wBjbegbY:Ezeu2RPU1ObhAb/b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6398750980:AAHdEX-sl3vmCKHFTkCkoZt9sCUIRpKV8ZA/sendMessage?chat_id=6008123474

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 968-63-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections