General

  • Target

    1116-71-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    e5d0b0c72fecd8830203a54ad20b4f87

  • SHA1

    8942b64270aded5d883eb6277ec21b3c42ffa736

  • SHA256

    09a403209beb000ae1dff1319d514af9c49f7aa629a433b10020e92822f53ea5

  • SHA512

    dfb9905a7b0c8326020610369048bc8ce1aa076da25390e09d120f83967278d13cb1cd7999814533b46e8051e89462eb52d295195cfd35ec2869ec9d3d891013

  • SSDEEP

    3072:wFlAi/s+PkZu0eLTm62Siib85tCBwBlFFbY:svp2SzbCDbb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5474174071:AAHlV4cw4zvSgwgRjR7s8E5ZbyzghXny9w4/sendMessage?chat_id=6143595836

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1116-71-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections