General

  • Target

    4696-1219-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    b5edd8d7993095e6ed11f53d8ed3ffa1

  • SHA1

    0fada93408004087b89bc14e5eb4b2d1992609ea

  • SHA256

    290cc4835bff13dd8689ab98ea93efb5810f59e6f5154c0831b9cd7e98cfbaca

  • SHA512

    aeeb57a698299fa5218167774e66ada796035e54caea5841b5e1b5201034a3fa409e7c228e42a673581af16d56836173d62fdc5db3e4c471b090bc0319e4ae96

  • SSDEEP

    3072:zOOYz2sMJZjJ3EJC3DQbUWQkakDuwBvU9DbY:gz5hbTvUFb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6312134911:AAEpy-chTluU2BKpH7SOV4jFqoRrZrAO-mQ/sendMessage?chat_id=6373691592

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4696-1219-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows x64


    Headers

    Sections