General

  • Target

    2680-20-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    c70fcc042f7ea4976409a01eab38af5c

  • SHA1

    b5ea4d44382e426156a4fbcff696f158bce6922e

  • SHA256

    ab6b37daff0c17ba0cd9d8401b219932606901ced6e54234319d9201c714679e

  • SHA512

    b05f7bf6db7b75b89ec6db92f425795989677a4a2d131ea24adcdc853b82151d2db51560f52c867e79efe4df8dd873b62cad80c822748654b3f11b9c79902f60

  • SSDEEP

    3072:S99yINAgKjV545jbvk5Hbe7fMuJN07TBqKj+Emftb5PZeL2hmWbIwvcXvPgbY:VINAgKjV5Cjbvk5Hbe7fMuJN07TIbu23

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7692220058:AAHVndQO9RuaWbiX3k3pjx15TMCoeBS0WKU/sendMessage?chat_id=7342994424

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2680-20-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections