General

  • Target

    2720-9-0x0000000000400000-0x0000000000424000-memory.dmp

  • Size

    144KB

  • MD5

    c71fa0e414f2322cc813183dc71eafd8

  • SHA1

    1ce6bc831dc07f69265b5f8301306f5df400457f

  • SHA256

    4b7a24c71e225bf1ef558fbb85f688a5cd74faeb06d3dd7b0946b04a6e071f8c

  • SHA512

    f0f22cd952156b4f990ae6c21d4b5ba096d02158d6e731dd60255b48db095ec98770ff403dd96b4e812b5c17741bfa6a6b94fb7c13602f4f5a02541aaf718159

  • SSDEEP

    1536:gOOYzPuJOhGUM1LZjJob+vBUFMlY6EJkEjOEXYYKoMF0cxQprxH/batb/zEZmoqe:gOOYz2sMJZjJ3EJxBxjob7locwBvP

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6735527834:AAH3PffzMarE3Ys8tyS4SQ0IBXrHFKmsmnQ/sendMessage?chat_id=6692536703

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2720-9-0x0000000000400000-0x0000000000424000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections