General

  • Target

    3856-1090-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    ce5ecec8d135397ef9407ce09fce172a

  • SHA1

    d0da55d485dc5f61252884fec1dad2db116007bf

  • SHA256

    d45bbbb0d0dfb6398059c4e802a2e46e169eeee6e13bbc7561da05509e7b39bb

  • SHA512

    8249897071fc1d72e69f8c1559c88e2df3c3db7b860fc7654f25b8f7743e78e657eb53fbe9a61d796d356f3aa0881b77ec1b7170b08e385e33f0b211df38ef6b

  • SSDEEP

    3072:EOOYz2sMJZjJ3EJbeIb7HyUywBvP0gbY:9z5ZbrhP1b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6311663777:AAE8NP53YXoDAfpfM7Ut2zGG4pncQ742mHI/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3856-1090-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows x86


    Headers

    Sections