General

  • Target

    1592-9-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    03254fa5a33231d2a9be2e9bbddc93d5

  • SHA1

    9d55f966c24f4bafa4ce37aaa67ca7f4b37d7c73

  • SHA256

    4b494ba065f38c7496593ddaded09b8329657b28b2ece55566bb80dbcce55300

  • SHA512

    d0c8bc5139db25a6b2a96b4dc09cfb6f5d1daa9058beec82393a2fd46cce7deddb6079d958aaa0a93ab713e2a3cfec9226f321be1ce4711f41ad02212f7792b2

  • SSDEEP

    3072:zOOYz2sMJZjJ3EJkTxnPVu8bUfaIwBvUtDbY:gz5eP1bkWUVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6380706838:AAHeNJQXD2oljrKM46U8G-Zyq3GHA5SyN3c/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-9-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections