General

  • Target

    1608-17-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    36ae95392c4d4cf9f1b7f6e087966ea9

  • SHA1

    a71e571a93491770559d265e20ca27c3119a2073

  • SHA256

    1c3e26051ff351048798f42b8f2210dc5673794450fbfe5ef4574a57e5459344

  • SHA512

    55c841432fd14000963abb63b3c3aac5181f0e4f9996de06bfc070a44f9ee7867184f28c4b74a4da64647aa36db8479651756ab82e7848160471e732621cf185

  • SSDEEP

    3072:3t1PdhaH88ECg9sIADX3b5UEAdo7mW8wvcXb9gbY:vdUvnb8eb

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1608-17-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections