General

  • Target

    3880-1220-0x0000000140000000-0x0000000140024000-memory.dmp

  • Size

    144KB

  • MD5

    b8462bdcc913124daab079c71575279b

  • SHA1

    c2fb948e5b71d05d0b1adcad8b555348158ab0b6

  • SHA256

    5da282fef9071d8f672624dd51a7dfedda5021b54c8cd42ba7b25f2f3d7c18e2

  • SHA512

    a5aa4f6e32ce4e3a8dc078b0081aee1bf5c334bf2788f632111e9a352a4446367687dcfade960bda8ef1235196cf54b22e6f89ed2e626687dcc213ceb9cab8ad

  • SSDEEP

    1536:qOOYzPuJ/ahpnPIdS4S+vBUFrlYY6b7xj/gTVonjvLMF4FXZBFpRb/cHQPE5ODFl:qOOYz2l2PIdSd6bXjbUhK47wBjRIDbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6234651025:AAFjbt6iZ1vTAi98WikYTmxJFGRMPTZ_0rI/sendMessage?chat_id=5000869361

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3880-1220-0x0000000140000000-0x0000000140024000-memory.dmp
    .exe windows x64


    Headers

    Sections