General

  • Target

    4052-1463-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    ee0a7dd4e8a87b70bc09731a7b4a2b22

  • SHA1

    b9101d76ad5cbe512e716d603906bc77302a3feb

  • SHA256

    987440523a22f8e55c1af4dc24d4d88f9ef19e43aab11eec877e9c2b1fb061b6

  • SHA512

    e554e1e3a53657e2062880463ee427292bf4a322649dff0d45000cea696261d7d3970632e398b713be7012324ea73f89291a3c0a0977564e5c096afb82e240e3

  • SSDEEP

    3072:qOOYz2l2PIdSd6blMbUenobjCwBjRIDbY:7z+pyb/QRab

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6307849414:AAGmDbHsZCN3tscyYeUw89m9JtBbXMioogc/sendMessage?chat_id=5582419717

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4052-1463-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows x64


    Headers

    Sections