General

  • Target

    2032-15-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    d7667932702b03f5d0fbc8e004156d65

  • SHA1

    1e2d323ea6b00a002472e1270192255532af6efb

  • SHA256

    0e9f61393df0c6b05735852c1bd1da95a06d0ab17b939fd143414866a8673e1a

  • SHA512

    5484e4fafb6dbdea48bcdd4ea5591730012c50387639b88c0a2dfc2710c938daeb0996f2328c910c9cf71b255787d07ec8e08a92c5011a071d7caca78d128330

  • SSDEEP

    3072:z99yINAgKjV545jbvk5Hbe7fMuJN07Taey1udZQ2+aOHbmxp6BHmWBwvcXVCgbY:OINAgKjV5Cjbvk5Hbe7fMuJN07TtOHbl

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7326718143:AAHCoPbdl01YWgtL8Z76U43CTNQwWuaC5Lk/sendMessage?chat_id=7121607304

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2032-15-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections