General

  • Target

    1552-15-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    e21a95b64ea4d9b3888ffe6a85cecc2a

  • SHA1

    f7eb1c67c497ec8538b829eef71bc8c1a19afc74

  • SHA256

    e7f377148a2e2a8a2296fa5743985738884d541e889376c8f438e302c0a83e99

  • SHA512

    f640326b6d0671ee53211e037f66794078820d5daa9dc53583f02ff5b00a6e9cd3fb41c964ba7365463c0962ad391d275d255c323b8f8bbd9c14274d71dbe95d

  • SSDEEP

    3072:d5h69Djgg3OX/UecXZKcb7fyWwB5x+gbY:wdQ2ZKcbAxfb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1552-15-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections