General

  • Target

    1544-12-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    e0c5e767b3f48be8a5374a5b8230d890

  • SHA1

    f99e4e6a83603e6ae182e483eeaacda17f23c6ff

  • SHA256

    ed120a79d4cffc6907ea0d720435d9d70824e3a95ab28907f71914736169ae29

  • SHA512

    dea5371c5d1083831db25c9a870c60dfd3cb790d1c4d13e048948b02f81f8745ad17df18501d9f897919cca93e294781d35fe1e4a3a7c661a3acd2fef4da004d

  • SSDEEP

    3072:QOOYz2sMJZjJ3EJKUgnqgb762DwBvPggbY:Jz58RnTbWPJb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6454266704:AAGc7MbDFOw3VJ52r1hPLsjSZvjH8GUmylk/sendMessage?chat_id=1467583453

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1544-12-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections