General

  • Target

    2160-8-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    7835f3cdd499f87756e6b7496405c2d3

  • SHA1

    35dc3102ce51279273aeb5e5c31e1578f3efff52

  • SHA256

    f1fa7c0de525a103534b6709106aa3ba83b74de287560d1af86f42ec62619208

  • SHA512

    163e44169e2e4812b70d949ae466644a60f65915774807764f6697180513dfa9b3cd060b1ddcb98826b1237c7d0201111ec0c26fc7e65ebeb3a10f0bb5cd07e7

  • SSDEEP

    3072:SOOYz2tcVwwAOZwG0+dJb73hPjwB4PTgbY:TzvG+Dbr7Pkb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6243209595:AAGECSmdSqJiVZcdFoBvotoaKcKT9Lz5Gvw/sendMessage?chat_id=1070926352

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2160-8-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections