General

  • Target

    3744-1223-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    c4a89d8b2b00c602b2931211f3fbba05

  • SHA1

    f29cbf048d194631c7a3189b61f67c623dedf1fb

  • SHA256

    896c9ec027db59e1a630e1fc6f71c8c7129fba3f58e0fc93d03b1955445c5abc

  • SHA512

    3b09802989cfced1db08d056458693b1ee6a6255756bf5f35f5cbdc59178aa0e3895e5db3b7f793065fa7f8c1a604a6f312afdcaeb3e5ae046aacf262d87a532

  • SSDEEP

    3072:zOOYz2sMJZjJ3EJvLGIz/GUbU44pwBvUtDbY:gz5huUbfUVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6594338187:AAE1iRDREogj2LKc8kui8CWv0QxoakIzDs0/sendMessage?chat_id=5582419717

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3744-1223-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows x64


    Headers

    Sections