General

  • Target

    2620-13-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    e06d33504d51c31ffc9943ca21cb529d

  • SHA1

    15ec25114f136061a56cb33931f279557e5c309e

  • SHA256

    0a53375660931bc142a2cf142a1fbe785fe719ea71e65b8722817594638ce31d

  • SHA512

    f3d28645466c79f13ab1ab85e07445296fcb0ee9e4afa39f85db54a7302b380318b254825f7cabd727008e8e7f81786dd932e8fa74f5ee48ee6a63b0920b56f0

  • SSDEEP

    1536:0OOYzPuJOhGUM1LZjJob+vBUFMlY6EJkEjOEXYYKoMF+1P+mUB0Z3b/zWkTo5piH:0OOYz2sMJZjJ3EJTHUGb7PTo7wBvP

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6475845807:AAGECr5FXzQHiMYtJd3FBZgHQBCE3bsESJo/sendMessage?chat_id=2095430248

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2620-13-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections