General

  • Target

    2676-133-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    454bcb9486e4838dd8705c6373553101

  • SHA1

    24a964a47614e60e4a024ad433cd0b75f99f6895

  • SHA256

    ed6525a0a58980e291059c0e8241d3383859f9615dc24e3302975f20ced2e046

  • SHA512

    8ede3c32ba0eded2a734ac4ee12e556aecb6762aa839052742e06c3e680e27af42450b74b5ebfbe55cec97680714c1e6becea5777e48f3df5879cce5ad1fbb8b

  • SSDEEP

    3072:YBGybM97hOQ/iK2jrOyipM/XbKjv01FlAi/sSt8C9wH9YiVF5O+uNXGb8wWGwB2W:HDthOzj8MzKQjbmYiP5OjNXGbdlbXA

Score
10/10

Malware Config

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2676-133-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections