General

  • Target

    2960-46-0x0000000000490000-0x00000000014F2000-memory.dmp

  • Size

    16.4MB

  • MD5

    06445b51ac9555ea9fb7a148a089d9ef

  • SHA1

    1977ffd4c7fd9fc777ce968523c7e2e0b2bc3eb0

  • SHA256

    df72e903f017bb6dc25ce90dd68630e056c6147c58290b3b9a72a31541a056c0

  • SHA512

    92c9fadef7d727e56fd7cd8684957c834be272e4f92a755014da589725132f34e1b8f3562f561021045ab41d83d9c2875522856f3e8a91b84d99dd8aa8a52a2a

  • SSDEEP

    3072:YvDdI8Ca564+4V4v4z4G43424A464y4K4v4f4u4A494V4t4w4H4j4Y4Y4s4P4W4G:AIxaabHdCb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage?chat_id=6419839739

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2960-46-0x0000000000490000-0x00000000014F2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections