General

  • Target

    3932-11-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    6833b657356cf66d16bfd772f2e62706

  • SHA1

    c86713c113c91ce8b12b1b9f64df618e8ce442a1

  • SHA256

    a6384877951dd863c63508c74c8d5962eb1dd987ee7c9faf4bcc1a5bebd8c051

  • SHA512

    606077a165d7b8d6f7302cf6af479842a3b2080efbea47678070b087a5f6ead6ae4e715d054921a2be9cef3831f49a2d1d1dbf1a9430f9e7fb7c67f8b5d87d40

  • SSDEEP

    3072:5OOYz2M2qnak0ZndVfBIEtUb7D3nqgwBvPFgbY:GzkdVptUbP+Pmb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6760797270:AAECTf5-db7M39Lx0qzBnaqnlAtUljrK5Pg/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3932-11-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections