General

  • Target

    4468-9-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    31df2b50bfc303643d5ea6c4d832d196

  • SHA1

    d9cb47cd973d0d3ab750da0cb5bb4c42ef413b5c

  • SHA256

    ca1be6630ccb6957f5a54b1596af21015df7d024f97168b420f6977d61e75dbc

  • SHA512

    a8053272dd155256a7f1170abbecfe08efb70399bd6a9420f54b5c9198e16561b016066e677b36300bec14ee2ba1c735319fb9722592ba1c8ea6bfcb7083ee8a

  • SSDEEP

    3072:TOOYz2sMJZjJ3EJ6gMItSbUHlwBvUtDbY:Az5pM5blUVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6566589691:AAFApTT4-vdsgK7fcVU9cwFelVxNx3knl8M/sendMessage?chat_id=5582419717

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4468-9-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections