General

  • Target

    2492-11-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    ed2d7a23cd15852308e06920c529b2a6

  • SHA1

    47a5ed54c50b7ada21da50cd73694f4cba62fc07

  • SHA256

    b9b5ee244fc9bb1bf8fc28bae2615dc3ee931e4f69ec6ed7974a0adc25d24d25

  • SHA512

    2b0fca82f3c7c881743c962a90201857adb2c568ebf54651e3b2ca06b3353dbd2d76e478e99202cebb2eb958a347f83d69b70e12e3f6acb49da163791f39311b

  • SSDEEP

    1536:JXOOYzPuJhArCetVk+a6noxMFfTsRmb/zfOd2npiOWB8PcNig0Kcl:JOOYz2A1Hk+a6no8b72dqwB8PXgbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6339928612:AAF--PH7Kfwf4Dph8taQxUsHJm3oLkMeciE/sendMessage?chat_id=5532763142

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2492-11-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections