General

  • Target

    4308-1053-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    fcbc5fbfedb5ab364df420caeefc09ec

  • SHA1

    6fb228ef95f1c96db2e8db6d5a66989aaee832ef

  • SHA256

    fe0380e162438c589bd41ffdded86476d11e19d609a6992961718f9c0b54774c

  • SHA512

    222e26d6161773089df00fe9934ece250da2db5a1a0dc0db1ad5848fdf7c5d9d221acf925947c5e303b890782371a85af86bef8b8c5289d6a97660cf9410e1a4

  • SSDEEP

    3072:zOOYz2sMJZjJ3EJp83nvN8bUOpFnnwBvUtDbY:gz5/8fN8b9uUVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5602583100:AAHjGMunLB5B4qaHMjdgSzOcJTEHFtDQ_wU/sendMessage?chat_id=6373691592

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4308-1053-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows x64


    Headers

    Sections