General

  • Target

    2840-4-0x0000000000400000-0x000000000042B000-memory.dmp

  • Size

    172KB

  • MD5

    667976ac757331ee6fa84648478f854f

  • SHA1

    4ee1acbeea08e4be57cb8908b99b22130f0dab3f

  • SHA256

    dea4966bcae39f91548487009db2c1906dea6b7327e6d80bba2a1137f1056d2a

  • SHA512

    01ded3296de03e616af6f601b7ce05f5c51309eaa8c69275024e84f1cac47201339387119a44c87acab24aa7c98b7e527209d874305936299cf318ca1bda84c9

  • SSDEEP

    3072:naL6CcOzsnGfuJha0Wny+cC5qVVbQs565CsQdwvxLDIUgbYcTGjH:/NOzOFc0WFUVb74IVbjG

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2840-4-0x0000000000400000-0x000000000042B000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections