General

  • Target

    756-68-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    28be7c263bad24a171b7926bb313f6e5

  • SHA1

    183960e2501e57188f137af8d2910476fccecfa0

  • SHA256

    e089dd42ceefbb55611430ad78e18e238f2c2e6eeaa586b988f79afbac6ef228

  • SHA512

    10b0c0e243d7acf05d20bfa7be1f6db3f647f8b97e397dfde8ab8586f949b33371ddc99256977f7fcac23c9f74671bbc228158312b388e76b51f80d3eb10be23

  • SSDEEP

    3072:2OOYz2CB+Lq9UZV7wMEb74X/PwBjbOgbY:3zVuBJEb8XKbvb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5884813542:AAE_NTHYHJxIqnVXOM0mUNE1h-A-ytq9y8I/sendMessage?chat_id=5334267822

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 756-68-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections