General

  • Target

    2056-9-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    63e1107568d5c1c379b6c33e5225b22d

  • SHA1

    3287904e7a9f7f44748c9573f6eedbf007603e6c

  • SHA256

    121ce8dea1c2b0bdc717b3937579fab8401652f04db38b87d74b9876234660a0

  • SHA512

    6b6820dc1d6608513679924f2d014ec8dc3898b320fe9fdb6490ba325fb2e1e4eff13319b4f88fd32a255ef87a8fe533564d3078a62d1c4a6ad905e9f47885bb

  • SSDEEP

    3072:DOOYz2sMJZjJ3EJm+X1bU9ZTLwBvUNDbY:Qz5NFbAMU1b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6609185892:AAFCGJ09V_hFm8GrfbIGpn7NZAMuK8VaOXs/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2056-9-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64


    Headers

    Sections