General

  • Target

    1996-991-0x0000000000460000-0x00000000014C2000-memory.dmp

  • Size

    16.4MB

  • MD5

    b03fd8e9ecc70f2ce935b2efb85577b8

  • SHA1

    035f3dfaf7c053bfc20f3a2a9ce9932bd561f707

  • SHA256

    e8a5e2218a73ba4a426af9c825c3772de2ede21adfdf056c4dd65337f411306a

  • SHA512

    bcecbf128c4212c6ac15fe03a5dccf07ba67587fa95f149df2ba41d7d8e0a7969866d2cd561f10b68d148fd6cbfd6bc73eb137c0746d4ca3f3478353eb623a91

  • SSDEEP

    3072:6vDdI8Ca564+4V4v4z4G43424A464y4K4v4f4u4A494V4t4w4H4j4Y4Y4s4P4W4k:yIxafbfldRb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage?chat_id=6419839739

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1996-991-0x0000000000460000-0x00000000014C2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections