General

  • Target

    4192-1088-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    5b39ca184f6dbda0a76da62aee9a3f4e

  • SHA1

    28b9baf97114860378df2207bf238cc97d70c989

  • SHA256

    64fe810e9fef1bd1be3b9f625f9910289ce94e812d01246ab1cf2f7e0940bf9c

  • SHA512

    e3bb4b7967c8b1779ffae3b936ec0b942c5aeb8d3f8dbb860e6d32cc731532c3ee248cd96fe6ab6279d903d86c41b9623ac77d2d2ff0e200cd844bd696500f06

  • SSDEEP

    3072:zOOYz2sMJZjJ3EJDkvbUSAL6wBvUtDbY:gz5lKbLYUVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6194052452:AAHZjDfFsfb4YU3bdevYQhe1OItrOM3z5oM/sendMessage?chat_id=6373691592

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4192-1088-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows x64


    Headers

    Sections