General

  • Target

    2008-1219-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    8351ff52c6f9e7f10ebd95ddaa758137

  • SHA1

    2e13ebe66493df04edaf496ce925ed9425741def

  • SHA256

    84aa9a47adb5ca60e72c585ff140c15ec66cea97a3b464b23b429c0a8dfd59be

  • SHA512

    3e26c3d5110e22184f496d7859aa30e43233b3909c320cc135ed27acb5c08f63af94b0251f9874c683ba960b73f29b7dfd8f47308c6bb33c8008361ea5dd473d

  • SSDEEP

    3072:jOOYz2sMJZjJ3EJTwfMbU7BmsDFwBvUdDbY:wz5efMbn5Ulb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6686117392:AAFAzrFfhkh7CNw-aLBRYtRTA9pnuES7m2g/sendMessage?chat_id=6373691592

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2008-1219-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows x64


    Headers

    Sections