General

  • Target

    1436-18-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    9b024ec5e2074a2707c7056d2f66f83a

  • SHA1

    4a1df802a444b212f6812deceed99f3dc5fcd000

  • SHA256

    128b407bc427c199a726b05d236f5b2c88088569cdfb1a4f334b060d92afccc1

  • SHA512

    29ede609fbca3be9db8c1b8cde93abf5fcfefbd3ba7004cdd10de7cd6ee1ffe0d1959fe67c3bb942008dcf54f42ada78c03f34cdc30cbccad7c80ad6358dac06

  • SSDEEP

    3072:nBGybM97hOQ/iK2jrOyipc/XbKjv0OhryR6UGnK6oZdUt9Cnb7SzpEFwBINKgbYa:UDthOzj8czKQbjNPUtInbapaNTb

Score
10/10

Malware Config

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1436-18-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections