General

  • Target

    3644-9-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    15ce2d103b23728a66d9a2594b4c153e

  • SHA1

    8908dabffe0dbf54f3dc2ac23f1f0d305d208c6c

  • SHA256

    84e186d78ab8f3e6c6543e4d73e31c6b4f6f7ba9daebc3f22dff269ef46aea00

  • SHA512

    6c668cec2361ac250d0e0324c2ba0e99c3d09a05c9e69759bef3c0dfeecd4c6de0d0017936d875d2ba708cea57bf1300cee384294dc46844ab93c1b4f42ec132

  • SSDEEP

    1536:fOOYzPuJ+iCU2J4nakXr+vBUFMlY6Zn9dCfdGhhLzMFy4Qqj1bb/cZqduCidpiOh:fOOYz2L2qnak0Zn1qlbU9nwBvUEDbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6350529534:AAEbFW9VBWTKQfN1Y3K_5RJARCtOn1UqK8o/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3644-9-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections