General

  • Target

    2768-121-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    44b5fe8a80a0495987c91c0a0b7d9d4c

  • SHA1

    26c27f747466dbe7687b14e89cda1adbd835a37c

  • SHA256

    d8b946e9bf0a86677ab4bbd93f645f4dce55bd7af18fda868b57026812e8cf6a

  • SHA512

    09b43132515ae722a33a0e63de74f6aa0618684fc4d89b31205da8a803c469225601673b077ec512b66ec318621fa3c437534fa3ac35c3741636ad924edd361f

  • SSDEEP

    1536:ZOOYzPuJnDD+Ob86+stW+AMFo2oc6ManHb/zjDsbUZWVpiOWBWjT:ZOOYz212p6+stW20nHb7fsYcPwBWjT

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot2106150449:AAHIwsHmr23aQkTnyeD_XA0cTAX8yk2mXFM/sendMessage?chat_id=1990813371

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2768-121-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows x86


    Headers

    Sections