General

  • Target

    2564-12-0x0000000000090000-0x00000000000B6000-memory.dmp

  • Size

    152KB

  • MD5

    b9700d0cd3fa881189c862cbbb1b0058

  • SHA1

    6d394eb39ef9ba086c2481e05deb4237674a0694

  • SHA256

    55e4a658c50de059b63d93999398fe4467d9566c7a5132175159cf47d5c9bf2c

  • SHA512

    fa4229442f0d42546bca4d0b3de7390c0f6a7b80f5ee9c78c457dfd01aa035215e9fa72a6bdf56f33d04889974f7125284cea7b0d85f2e0e4e0dfc9380b56eff

  • SSDEEP

    3072:i99yINAgKjV545jbvk5Hbe7fMuJN07TwNumqoyw3cqUb5gnVImWuwvcXmGgbY:lINAgKjV5Cjbvk5Hbe7fMuJN07TQQbVb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7887381131:AAH4jHJ7Kc0dolQ_x2jW8rTr7XHsdKKLTaM/sendMessage?chat_id=6557702940

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2564-12-0x0000000000090000-0x00000000000B6000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections