General

  • Target

    5064-8-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    b5cdae7535a2ee0ad7d3065296c1e23e

  • SHA1

    234283b650275d33f3f291e60e1820f0c2684b95

  • SHA256

    b20d56e8c39bb25eb353f08879ba486890eb62fc8397c68e9607185dad66e161

  • SHA512

    2e0e08982a9a73526acdf5e72d8b5ae1d5e78520c73f67bbbd901acdfc430c9f907e01c1e066926994d48f327b8492de5dfbaeef8eee74f9da006495fdab5e85

  • SSDEEP

    3072:TOOYz2sMJZjJ3EJVNprfbUiY6RwBvU9DbY:Az5nfbeRUFb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6675876060:AAEydIMROdr0XsdBN7fk_mjJRQvyv_ectv4/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5064-8-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections