General

  • Target

    2568-12-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    fee8799ca0d06ccccef4216fffd3a3fc

  • SHA1

    bee74e0aa3cfc4faaf5163ddd345831cc4fe76a3

  • SHA256

    25a00ddaa759328d0bcf0845712ae0316bf2491e1c7ee2cb53e9b089a2bcd619

  • SHA512

    f0050b4b3feeca826ba8c588a6bb4acc0b833ca93c0787585a83dab793ff457e4b7e15478b39c86cc4d0869a42f34222c523da5988380374ccfd134e5062b19e

  • SSDEEP

    3072:NOOYz2L2qnak0Znr7sKZWb7FFwBvP1gbY:KzNr7sKZWbqPWb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6419786954:AAG-8viGVDoGmC2CrUGDLpxfgdrqnRKve-8/sendMessage?chat_id=6465958501

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2568-12-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections