General

  • Target

    2920-3-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    fb23edea0d865a8a8552443a99398bae

  • SHA1

    6a158119b3dbdab6244e23e3a132c8a73df8d478

  • SHA256

    99d976e829908a3df6f7e3a52f4ccab469b1679fdd65831b6f35a8a4638ca3e5

  • SHA512

    ceb636f42aea22f92510db1eb4b6711e276aecd7d9b662085e08efcca740ee6678a442bfe89080480f7a8f686889bc4a99d91567c36d4265d721b7a115468c1b

  • SSDEEP

    3072:j99yINAgKjV545jbvk5Hbe7fMuJN07TvNumqoywIheb5FmWPwvcXm9gbY:+INAgKjV5Cjbvk5Hbe7fMuJN07TLWeb7

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7913958792:AAFOhfKo5L7M50XG6odxxQQwJAeD3zGEuJU/sendMessage?chat_id=7004340450

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2920-3-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections