General

  • Target

    2752-73-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    301981cc4f522313b6c3303fd67617a5

  • SHA1

    d9b7200d17f4bf058c8bf70de944e49b249de46e

  • SHA256

    640061c032f9a1bf5d7c72b9e427d4c5041ee4bd63412c20ac915c99fd2c0be3

  • SHA512

    4cac084f1f660d935c100d12d9ffb80f6f80c664dd0137bf4f66214ba3768452c18fd9d5d8203b64a885f23127b0b4268e2224d9486f63af5ce9c10704e507de

  • SSDEEP

    1536:2OOYzqIIqS+nD+HKwpfpr0GLrzGbM8MlWIb/ztVkpacNpiO5BunY:2OOYzvIW6HKwbpLrqg1b70ocXfBun

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6454328840:AAFhLVGRU2auzr2_1A08UAoSV1INpU42j7g/sendMessage?chat_id=6315669338

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2752-73-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections