General

  • Target

    2028-16-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    1bb32ed9cb3b3d472b650fffc1d32326

  • SHA1

    4d6a560f0457657491df1df00b944fbc2ab0e2e1

  • SHA256

    44e50da14dd5ba17fa0778bb79a3d233aa6903d6b66a5173fa53de80d50910dc

  • SHA512

    830a6db7b72d890f9f960aa76e338201eabf3d25285da78145ff9060886efc8dd56d628bd5535b2f2708d4054547767bca6c8b9e4df093c8db96003e9cbfa2f6

  • SSDEEP

    3072:FOOYz2CBwggutBM3pmb7Ju5wBnTu5gbY:SzV3JbbTuyb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6076917727:AAGbsf1c44EC0CR26JUQPsvvVqX6Ki5kb9k/sendMessage?chat_id=6282564049

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-16-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections