General

  • Target

    2832-3-0x0000000000400000-0x0000000000426000-memory.dmp

  • Size

    152KB

  • MD5

    9d428c6cc4648784150c7c722b2222b8

  • SHA1

    ae82798c09d684088aed050ec5b97e0ec32f30a5

  • SHA256

    f5c5059a470704d3bbdb3e4b70bfb897bdc2ec5feb3d5418f7f6ad97635c7159

  • SHA512

    134eb94e597911ee10eeac054c1489c32d3e4113418c4aad8a7dd3fc213cf28eece9eac72b7582fce427ff320429e06a76497e701b914362ad315bc0ed075263

  • SSDEEP

    3072:f99yINAgKjV545jbvk5Hbe7fMuJN07TwNumqoywNM7ib5wmWSwvcXmEgbY:yINAgKjV5Cjbvk5Hbe7fMuJN07TQLNbM

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7541499630:AAESy1nWQ4poIra9UxdBRC70wQqWdJNny3U/sendMessage?chat_id=6557702940

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2832-3-0x0000000000400000-0x0000000000426000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections