General

  • Target

    3756-1465-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    8fd2c29ce33847d627859a2353f5cf36

  • SHA1

    b6b9ca403082f012bd197d72df00acdafc982e99

  • SHA256

    3736d48446c95cd19640d0b804da1b08fa196d821e9c2609525b7a45683e21d7

  • SHA512

    b3cbbbbb8474b22628a9fa15ef61d2e30dd4e63e10e5b8d814ae49d2c2d5b1c965a15e21ef933bff39702304f6fc6c247d7fd45e268ad056a9c21bc44b9668ab

  • SSDEEP

    3072:SOOYz2l2PIdSd6bd6KebUYqdywBjRIDbY:Tz+pZ6Keb+Rab

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6223040934:AAFZR7-nJPBtNtKiKjjFvb-144WYhjW9KHY/sendMessage?chat_id=6373691592

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3756-1465-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows x64


    Headers

    Sections