General

  • Target

    4992-9-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    ad6bf9462b56ab81914ff08d4b57cad7

  • SHA1

    305fc3108aff943c764a93bc4ff920627e00491b

  • SHA256

    66b7a2853ffa02779c8bcb206a7ce93d2c93d026870cb852d70752bf1ff9a278

  • SHA512

    ba5a2d688c314ab8c8c5fa99f54568feccfe84801e2e9087a92ca6cfe80d66ee6a1810e577473edf2716b4cdeaa05eab9bb57cd7a8ed188d8d7c5996ef344820

  • SSDEEP

    3072:TOOYz2sMJZjJ3EJlCTcy1E4DbUgMEwBvUtDbY:Az5EB1EEbIUVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6429805701:AAEngMg5r6ewcqgGwVjFKJpjYF7Sc8nwhxA/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4992-9-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections