General

  • Target

    4080-10-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    dd4850eef74bfe073ea5e4cad9ca0492

  • SHA1

    660d801c1064261f02c18a76634ede996cab6c0c

  • SHA256

    247e8b04ce0adf71a1a6f9de035b59a5c58c30f6a723ca0813dc1ad1e641cd2e

  • SHA512

    1f81e14eae41cdf6554b831e2576a6cce59fe66f3e4e88a57662e83f2141f291bdaaba5601ec433dddf7a9ce7ed7b649482547da57f70552855ae4f52623bd4a

  • SSDEEP

    3072:DOOYz2sMJZjJ3EJH6Y1AnbUaswBvUNDbY:Qz5kY1AnbTU1b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6559576673:AAE6veQ5mMCrHEUknXuYdCi8fCjm4p3sg-0/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4080-10-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections