General

  • Target

    2700-1225-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    0cc1754ae7833d819d126713d87e8816

  • SHA1

    239ed199f8d9ade0d446436d383f12ceb0c56ee8

  • SHA256

    4a117876a38d14640edd2a6054d21757910fa6c766a2134ff9d8d8208da53e28

  • SHA512

    473632feea063503f11e96052e048e3fcb815560b9ba94c76a05895155dd02a80c9ada5f93d127367164171a054a27791b1a58eb68daee85561e7e7fdce8f188

  • SSDEEP

    1536:u3OOYzPuJzwsWa1M6GievBGeMFATACLY6IHnb/zc8yp70HpiOWBKnINyg0Kcl:MOOYz2W29GievBGdTb74J0JwBKn7gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6400401861:AAHzywDQVA6oWh8Aa9-h_qQEJJmgrfSwFvM/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2700-1225-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections