General

  • Target

    1124-140-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    2b1f294a05f94f2e0a27b4fdaf558013

  • SHA1

    db3859ed90423c0ddb86d1c76853d6d29a880378

  • SHA256

    41e868fa3e5f594fbf85f15dae9354ebae03e7b83001cbbc60fff8977d8828b8

  • SHA512

    e4593dbf54be2b5b0db6cdd22def1ec239744ed8703b8d96645dc427248d859ddf2235dacfd7d100e445b346b7a976ba022cedbaec04b55272d92ccf08b3ede0

  • SSDEEP

    3072:IFlAi/s+PkZu0eLTqFbGreiKb8a6wBldFbY:0vpyFbGreiKbfHDb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6110227557:AAFnYhOxxoDPNmQNy-wS6l5BpCF0bpHLbr8/sendMessage?chat_id=5836408145

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1124-140-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections