General

  • Target

    2808-16-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    05e398c2c0f462c7c4af310212e0c7ff

  • SHA1

    3b7744baa2569a1e90988b14b1faa4633485ad49

  • SHA256

    b95445d293b0f6304435f82a04f2758f341b7a061d12381a35a29f2dc0aa0c79

  • SHA512

    fdc468f61b49680a65a86d61452363e59bc05166d997d75fcc73eaeadf190d8b686ff545bd800d699477c0761f772802c2cbe7b35e407f8cb860bac652790ab6

  • SSDEEP

    3072:p99yINAgKjV545jbvk5Hbe7fMuJN07Taey1udZQ2+aOHbmxp6BHmWcwvcXVCgbY:0INAgKjV5Cjbvk5Hbe7fMuJN07TtOHbU

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7335929134:AAHf3ReUOk-YWTLyi78ZIgiJgHfofRU2NZ4/sendMessage?chat_id=5120307802

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2808-16-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections