General

  • Target

    1800-12-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    27e5c6f4b770109dfb53187c2add4a93

  • SHA1

    b84d8ba2be0de81b2d96ca5d4eed1751b9a8a2f2

  • SHA256

    ee14d0ee1423a6512c81dea23fbdaf877953691c0e0a1a373d9bc6d0ed6bacbe

  • SHA512

    a5bfeeb53c21b093bb4544ab8d5864afaf4b8fd74c716c6571b965fd3a3771e0bda0f831c7f603b03352ce869b4f67f83012f11879ce82fc5d22980b29aa540e

  • SSDEEP

    1536:D/zTgRS4XFxO4XVaohVbmob/3GVdclmHwsL2piOWvxG3Tg0Kcl:D/zcZxOKh1Zb/pAwsLwwvx4gbY

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1800-12-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections