General

  • Target

    3816-12-0x0000000140000000-0x0000000140022000-memory.dmp

  • Size

    136KB

  • MD5

    54ca6e67fbd4a71a6d2e42a92c44ca63

  • SHA1

    b3d2482d5ec396215eec70a3a0d95c597a856f5b

  • SHA256

    b4698d1d6c192fb637339d082a44b5edd957fe5e47f5e98076be3c3378880ed7

  • SHA512

    c413f2e9c42fd15aff5e2eb3a25b463c4d1f2f23a2d9705554911ce21a9b0d232609cd4f87b07c3395e6d6aeaf6845e4ee8e4ab3cf38993d5034b8765602c614

  • SSDEEP

    3072:TOOYz2sMJZjJ3EJkbUcmCfU1wBvU9DbY:Az5+bsMbUFb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6582190069:AAEOxo2omzivwf1WBdz3Db1ZJCRSMBWbgoQ/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3816-12-0x0000000140000000-0x0000000140022000-memory.dmp
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections